)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:28 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:04:28 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x4, 0x80000) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f00000000c0)=0xffffffff) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) 20:04:28 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0xc0045878, &(0x7f0000000000)={0x2}) [ 2915.321333] XFS (loop3): SB sanity check failed [ 2915.326275] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2915.337854] XFS (loop3): Unmount and run xfs_repair [ 2915.342947] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2915.349616] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2915.362510] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ 20:04:28 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0xffffffffa0008000}) [ 2915.395773] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2915.414046] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2915.422614] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2915.430906] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2915.467492] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2915.498585] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2915.536926] XFS (loop3): SB validate failed with error -117. 20:04:28 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:28 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:04:28 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:28 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x8000a0ffffffff}) 20:04:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) r1 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x1, 0x8200) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x30, r2, 0x8, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x401}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xfffffffffffffffd}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x40) 20:04:28 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:28 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\b', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:04:29 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0xa0008000}) 20:04:29 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) getpgrp(0x0) syz_extract_tcp_res$synack(&(0x7f0000000140), 0x1, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) r3 = getpgrp(r2) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0xffff, 0x101, 0x701, 0x6, 0x0, 0x200, 0x20000, 0xc, 0x1d62, 0xfa, 0xe48e, 0x9fc, 0x100000001, 0x4, 0x7, 0x1, 0x401, 0x5, 0x1, 0x3ff, 0x9, 0x1, 0x7f80000, 0x5, 0x7, 0x0, 0x2, 0x0, 0x8, 0xfffffffffffffffb, 0x0, 0x8, 0x7, 0x80000000, 0x1000, 0xc, 0x0, 0x84b4, 0x2, @perf_bp={&(0x7f0000000040), 0x1}, 0x10008, 0x6, 0x9, 0xf, 0x901, 0xef3, 0x7}, r3, 0x10, r0, 0xb) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) 20:04:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:29 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x8000a0}) 20:04:29 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\b', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) [ 2915.977919] XFS (loop3): SB sanity check failed [ 2915.988608] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2916.001193] XFS (loop2): SB sanity check failed [ 2916.006186] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2916.055601] XFS (loop2): Unmount and run xfs_repair [ 2916.075763] XFS (loop3): Unmount and run xfs_repair [ 2916.092452] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2916.102475] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2916.120712] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2916.138736] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2916.147328] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2916.164227] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2916.174780] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2916.183867] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2916.193728] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2916.196514] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2916.210484] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2916.221166] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2916.227030] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2916.238425] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2916.247085] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2916.250631] XFS (loop2): SB validate failed with error -117. [ 2916.257890] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2916.269680] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2916.278031] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2916.286258] XFS (loop3): SB validate failed with error -117. [ 2916.388125] XFS (loop3): SB sanity check failed [ 2916.393057] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2916.404695] XFS (loop3): Unmount and run xfs_repair [ 2916.409845] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2916.416716] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2916.425087] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2916.433430] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2916.441708] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2916.450072] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2916.458351] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2916.466550] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2916.474812] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2916.483156] XFS (loop3): SB validate failed with error -117. 20:04:29 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:29 executing program 5: syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x5, 0x103000) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) 20:04:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:29 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0}) 20:04:29 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="786673fc", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:04:29 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfsH', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:29 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0}) 20:04:29 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="786673fe", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:04:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x80) 20:04:29 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) [ 2916.781985] XFS (loop3): SB sanity check failed 20:04:30 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0}) [ 2916.806323] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2916.858919] XFS (loop3): Unmount and run xfs_repair [ 2916.875111] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2916.882015] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2916.890483] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2916.936619] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2916.970484] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2916.989861] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2917.003424] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2917.017336] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2917.026473] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2917.035323] XFS (loop3): SB validate failed with error -117. [ 2917.041845] XFS (loop2): SB sanity check failed [ 2917.046898] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2917.058070] XFS (loop2): Unmount and run xfs_repair [ 2917.063236] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2917.069912] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2917.078111] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2917.086312] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2917.094601] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2917.102787] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2917.110940] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2917.119278] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2917.127448] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2917.135645] XFS (loop2): SB validate failed with error -117. 20:04:30 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:30 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:04:30 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x40, 0x0) ioctl$EVIOCSKEYCODE(r2, 0x40084504, &(0x7f0000000280)=[0x26e2, 0x80]) ioctl$DRM_IOCTL_GET_MAGIC(r0, 0x80046402, &(0x7f0000000140)=0x1) r3 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x402) ioctl$EVIOCGPROP(r3, 0x80404509, &(0x7f0000000080)=""/171) msgget(0x2, 0x10) 20:04:30 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:30 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0}) [ 2917.272270] XFS (loop2): SB sanity check failed [ 2917.283607] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 20:04:30 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0xffffffffa0008000}}) [ 2917.334066] XFS (loop2): Unmount and run xfs_repair [ 2917.343555] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2917.361172] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ 20:04:30 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) [ 2917.379445] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2917.408168] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2917.438441] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2917.449732] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 20:04:30 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:30 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:04:30 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x8000a0ffffffff}}) [ 2917.458344] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2917.467356] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2917.476178] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2917.484722] XFS (loop2): SB validate failed with error -117. [ 2917.496451] XFS (loop3): SB sanity check failed [ 2917.531289] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2917.552427] XFS (loop3): Unmount and run xfs_repair [ 2917.557583] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2917.564504] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2917.573587] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ 20:04:30 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:30 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x200202) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x9) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x40) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) [ 2917.581864] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2917.615769] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2917.652785] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2917.662489] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2917.670888] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2917.685193] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2917.726815] XFS (loop3): SB validate failed with error -117. [ 2917.795109] XFS (loop2): SB sanity check failed [ 2917.799907] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2917.822806] XFS (loop2): Unmount and run xfs_repair [ 2917.832888] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2917.839602] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2917.849159] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2917.857865] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2917.866280] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2917.874561] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2917.883062] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 20:04:31 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="786673cc", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:04:31 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:31 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0xa0008000}}) 20:04:31 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$video(&(0x7f0000000280)='/dev/video#\x00', 0x4, 0x2) poll(&(0x7f0000000240)=[{r1, 0x408}, {r0, 0x8}, {r0, 0x40}, {r0, 0x200}, {r0, 0x4}, {r0, 0x20}, {r0, 0x8}], 0x7, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x8, 0xfffffffffffffffe, 0xaa, 0x20, 0xffffffffffffffff, 0x6}, 0x2c) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x4800, 0x0) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f0000000080)=""/251) [ 2917.891207] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2917.899752] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2917.908335] XFS (loop2): SB validate failed with error -117. 20:04:31 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x8000a0}}) 20:04:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:04:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:04:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:04:31 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000100)={0x0, @speck128, 0x2, "fa696fd6937703ca"}) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) r2 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 20:04:31 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:31 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2918.260197] XFS (loop2): SB sanity check failed [ 2918.265445] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2918.278590] XFS (loop2): Unmount and run xfs_repair [ 2918.284124] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2918.290900] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2918.299164] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2918.307510] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2918.315762] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2918.323958] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2918.332190] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2918.340399] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2918.348615] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2918.356994] XFS (loop2): SB validate failed with error -117. 20:04:31 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="786673e6", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:31 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0xffffffffa0008000}}) 20:04:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:04:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x2400, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000440)={0x3, 0x0, 0x100000001, 0x3, 0x3}) r2 = open(&(0x7f0000000040)='./file0\x00', 0x20442, 0x4) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0xfffffffffffffffe}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000100)={0x0, 0xfffffffffffffff8}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000240)={r3, 0x1, 0x80, 0x8001, 0xfff, 0x6, 0x5, 0x1, {r4, @in={{0x2, 0x4e24, @remote}}, 0x1, 0x9, 0x5, 0x0, 0x20000000000000}}, &(0x7f0000000300)=0xb0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r2, 0x80845663, &(0x7f0000000340)={0x0, @reserved}) 20:04:31 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24bca3fed19]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:31 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x8000a0ffffffff}}) 20:04:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:04:31 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x2000, 0x0) ioctl$VHOST_SET_VRING_ERR(r1, 0x4008af22, &(0x7f0000000080)={0x3, r2}) r3 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r3, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) [ 2918.526712] XFS (loop2): SB sanity check failed [ 2918.531458] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 20:04:31 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24bca3fed19]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2918.587042] XFS (loop2): Unmount and run xfs_repair [ 2918.621214] XFS (loop2): First 128 bytes of corrupted metadata buffer: 20:04:31 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) [ 2918.677650] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2918.732292] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2918.755917] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2918.772223] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2918.787292] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2918.795624] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2918.808593] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2918.823020] XFS (loop3): SB sanity check failed [ 2918.823320] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2918.828118] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2918.836155] XFS (loop2): SB validate failed with error -117. [ 2918.848129] XFS (loop3): Unmount and run xfs_repair [ 2918.859019] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2918.866320] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2918.875148] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2918.883536] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2918.891745] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2918.899979] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2918.908232] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2918.916430] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2918.924601] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:04:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="786673ff", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:32 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="78667302", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:04:32 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0xa0008000}}) 20:04:32 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2918.933018] XFS (loop3): SB validate failed with error -117. 20:04:32 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x2000, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000240)={r2, 0x1, 0x6, @dev={[], 0x1d}}, 0x10) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'system.', "7d212a657468317b8476626f786e6574316e6f646576706f7369785f61636c5f6163636573736d643573756d47504c6d696d655f747970656500"}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) rt_sigreturn() 20:04:32 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:04:32 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x8000a0}}) 20:04:32 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:32 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="786673ff", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:04:32 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x100, 0x0) getpeername$unix(r1, &(0x7f0000000080), &(0x7f0000000100)=0x6e) 20:04:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:32 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0xffffffffa0008000}}) 20:04:32 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="786673ff", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:04:32 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:32 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x12267c, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:04:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) 20:04:32 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x8000a0ffffffff}}) [ 2919.399688] XFS (loop3): SB sanity check failed [ 2919.422229] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2919.453380] XFS (loop2): SB sanity check failed [ 2919.458432] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2919.468030] XFS (loop3): Unmount and run xfs_repair 20:04:32 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19ed3fca4b020000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2919.504214] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2919.538634] XFS (loop2): Unmount and run xfs_repair 20:04:32 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0xa0008000}}) [ 2919.561336] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2919.570627] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2919.596071] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2919.602818] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ 20:04:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x7ff, 0x3}) [ 2919.635830] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2919.648352] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2919.675948] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2919.704419] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2919.709833] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2919.722233] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2919.736104] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2919.744798] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2919.753602] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2919.761995] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2919.774500] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2919.783846] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2919.792538] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2919.800937] XFS (loop2): SB validate failed with error -117. [ 2919.802825] XFS (loop3): SB validate failed with error -117. [ 2919.979157] XFS (loop3): SB sanity check failed [ 2919.984045] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2919.995264] XFS (loop3): Unmount and run xfs_repair [ 2920.000307] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2920.007067] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2920.015257] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2920.023467] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2920.031628] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2920.039867] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2920.048221] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2920.056401] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2920.064574] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2920.072946] XFS (loop3): SB validate failed with error -117. 20:04:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="78667301", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:04:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:33 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x8000a0}}) 20:04:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000080)) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) 20:04:33 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs4', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:33 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x0, 0xffffffffa0008000}}) 20:04:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='io.bfq.weight\x00', 0x2, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000000c0)) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000100)={0x0, 0x12c}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000240)=r3, 0x4) 20:04:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:33 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\r', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:04:33 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x0, 0x8000a0ffffffff}}) 20:04:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x4, 0x10000) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) 20:04:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0xffffff1f, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:04:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="786673cc", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:33 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x0, 0xa0008000}}) [ 2920.607452] XFS (loop2): SB sanity check failed 20:04:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x2}) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$SG_GET_NUM_WAITING(r1, 0x227d, &(0x7f00000000c0)) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000080)={0xfffffffffffffffa, 0x25c8, 0x6df6, 0x1000, 0x1, 0x7f, 0xffffffff, 0x67, 0xfd, 0x7f}) [ 2920.668470] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2920.707423] XFS (loop2): Unmount and run xfs_repair 20:04:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) [ 2920.725012] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2920.757917] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2920.767042] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2920.775407] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2920.799491] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2920.821424] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2920.837818] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2920.860537] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2920.876917] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2920.885585] XFS (loop2): SB validate failed with error -117. [ 2920.920425] XFS (loop3): SB sanity check failed [ 2920.925417] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2920.936869] XFS (loop3): Unmount and run xfs_repair [ 2920.941964] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2920.948812] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2920.966573] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2920.974874] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2920.983118] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2920.991256] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2920.999429] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2921.007649] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2921.015865] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2921.024157] XFS (loop3): SB validate failed with error -117. 20:04:34 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:34 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x0, 0x8000a0}}) 20:04:34 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x500, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:04:34 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000040)={0x1, "e486328dcd5420f6473eacb7032976a08f6a770a8c9a6e02af6d95263cdf4b69", 0x3, 0x9, 0x8c2c21a4fc5d0d07, 0x10003, 0x0, 0x8}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) 20:04:34 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffffffa0008000}}) 20:04:34 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) [ 2921.183083] XFS (loop3): SB sanity check failed [ 2921.187847] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2921.242813] XFS (loop3): Unmount and run xfs_repair 20:04:34 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8000a0ffffffff}}) 20:04:34 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) socketpair(0x2, 0xa, 0x2, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000140)={0x3dd, 0x8}) getsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f0000000080)=0x7fff, &(0x7f00000000c0)=0x4) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000100)) [ 2921.263529] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2921.293303] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ 20:04:34 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0xf, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) [ 2921.339098] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2921.374220] XFS (loop2): SB sanity check failed [ 2921.379932] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2921.396869] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2921.448589] syz-executor5 uses obsolete (PF_INET,SOCK_PACKET) [ 2921.453089] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2921.472429] XFS (loop2): Unmount and run xfs_repair [ 2921.473663] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2921.482985] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2921.493134] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2921.502055] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2921.511761] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2921.526732] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2921.538483] XFS (loop3): SB validate failed with error -117. [ 2921.544683] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2921.565877] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2921.574412] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2921.583223] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2921.591358] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 20:04:34 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) [ 2921.609311] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2921.618138] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2921.631232] XFS (loop2): SB validate failed with error -117. 20:04:35 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:35 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa0008000}}) 20:04:35 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x5, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:04:35 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) 20:04:35 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8000a0}}) 20:04:35 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0xfffffdef}], 0x0, 0x0) 20:04:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) r1 = fcntl$getown(r0, 0x9) ptrace$getenv(0x4201, r1, 0x5, &(0x7f00000000c0)) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/netfilter\x00') ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x13) ioctl$VIDIOC_G_AUDOUT(r2, 0x80345631, &(0x7f0000000080)) [ 2921.911909] XFS (loop3): SB sanity check failed [ 2921.923000] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2921.934781] XFS (loop3): Unmount and run xfs_repair [ 2921.984831] XFS (loop2): SB sanity check failed [ 2921.989843] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2922.003688] XFS (loop3): First 128 bytes of corrupted metadata buffer: 20:04:35 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:35 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0008000}}) [ 2922.028528] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2922.047724] XFS (loop2): Unmount and run xfs_repair [ 2922.078662] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2922.089644] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2922.111927] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2922.121516] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2922.138730] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2922.152257] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2922.165257] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 20:04:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) [ 2922.173841] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2922.184138] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2922.196492] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2922.209210] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2922.217914] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2922.231104] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2922.239791] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2922.259171] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2922.273172] XFS (loop3): SB validate failed with error -117. [ 2922.278110] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2922.288019] XFS (loop2): SB validate failed with error -117. [ 2922.478914] XFS (loop2): SB sanity check failed [ 2922.484097] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2922.501330] XFS (loop2): Unmount and run xfs_repair [ 2922.507179] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2922.514461] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ 20:04:35 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) [ 2922.523886] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2922.559856] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2922.568130] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2922.576928] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2922.585119] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2922.593293] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2922.601427] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2922.609757] XFS (loop2): SB validate failed with error -117. [ 2922.641973] XFS (loop3): SB sanity check failed [ 2922.646794] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 20:04:35 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:35 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:35 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8000a0ffffffff}}) 20:04:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0xa902, 0x0) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000ffb000/0x4000)=nil, 0x4000}, 0x1}) 20:04:35 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0xfdef}], 0x0, 0x0) [ 2922.658078] XFS (loop3): Unmount and run xfs_repair [ 2922.663786] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2922.670727] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2922.720818] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2922.725855] QAT: Invalid ioctl [ 2922.746557] QAT: Invalid ioctl [ 2922.747084] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 20:04:35 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xa0008000}}) 20:04:35 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x2}], 0x0, 0x0) [ 2922.773364] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2922.802881] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 20:04:36 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2922.833130] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 20:04:36 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x2, 0xd, 0x0, 0x7, 0x8, 0x0, 0x70bd2a, 0x25dfdbff, [@sadb_key={0x2, 0x0, 0x10, 0x0, "9dc9"}, @sadb_sa={0x2, 0x1, 0x4d3, 0x5, 0x10000, 0xdc, 0x1, 0xc0000000}, @sadb_sa={0x2, 0x1, 0x4d2, 0xffff, 0x4, 0x3f, 0x0, 0xe0000000}]}, 0x40}}, 0x1) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) 20:04:36 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8000a0}}) [ 2922.886435] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ 20:04:36 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0xfffffffffffffdef}], 0x0, 0x0) [ 2922.931814] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2922.970524] XFS (loop3): SB validate failed with error -117. [ 2923.008497] XFS (loop2): SB sanity check failed [ 2923.031492] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2923.072418] XFS (loop2): Unmount and run xfs_repair 20:04:36 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="78667302", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) [ 2923.103722] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2923.131102] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2923.162278] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2923.171011] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2923.179984] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2923.188310] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2923.196663] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2923.211344] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2923.225189] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2923.240421] XFS (loop2): SB validate failed with error -117. 20:04:36 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:36 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x20000, 0x84) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f00000000c0)={0x4, 0x35, &(0x7f0000000080)="1227167252b806bb7d8a7e756a64cdf3933365c6a08640cae6c0234afae5379d888126baefe6291334bde836d11f3b8dea7df1d610"}) set_mempolicy(0x3, &(0x7f0000000100)=0x3fa, 0x6) 20:04:36 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0008000}}) 20:04:36 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x5}], 0x0, 0x0) 20:04:36 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000a0ffffffff}}) 20:04:36 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x8100000}], 0x0, 0x0) 20:04:36 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="786673db", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:36 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:36 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0008000}}) 20:04:36 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:36 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000000080)={0x5, 0x0, {0x57, 0x1c00000000000, 0xfffffffffffffffe, {0x69b}, {0x1, 0xb5}, @cond=[{0x3, 0x6, 0x400, 0x2, 0x80, 0x4}, {0x6e, 0x0, 0x0, 0x1f, 0xfffffffffffffffe, 0x272cf486}]}, {0x57, 0x1, 0x3, {0x6}, {0xea4, 0x7}, @period={0x5f, 0xff, 0x84, 0x6, 0x97, {0x1b, 0xd4, 0x5, 0x2}, 0x8, &(0x7f0000000040)=[0x2ded, 0x8, 0x28d0, 0x101, 0x9, 0x0, 0x9, 0x8]}}}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) 20:04:36 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:36 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000a0}}) [ 2923.831783] XFS (loop2): SB sanity check failed [ 2923.838614] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 20:04:37 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0008000}}) 20:04:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:37 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904, 0x1}) [ 2923.906320] XFS (loop3): SB sanity check failed [ 2923.911120] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2923.932813] XFS (loop2): Unmount and run xfs_repair [ 2923.938204] XFS (loop2): First 128 bytes of corrupted metadata buffer: 20:04:37 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000a0ffffffff}}) [ 2923.972055] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2923.982223] XFS (loop3): Unmount and run xfs_repair [ 2923.998257] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2924.008695] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2924.029890] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2924.043087] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2924.064665] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2924.072310] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2924.087718] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2924.096505] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2924.100349] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2924.136050] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2924.153255] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2924.169992] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2924.180566] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2924.185856] XFS (loop2): SB validate failed with error -117. [ 2924.197469] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2924.212723] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2924.221215] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2924.229945] XFS (loop3): SB validate failed with error -117. 20:04:37 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x20010004}], 0x0, 0x0) 20:04:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdffffff00000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:37 executing program 5: r0 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x2, 0x100) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000100)={{0x5, 0x9}, 0x1, 0x5d7a, 0x2, {0x1000}, 0x17b, 0x3}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_QUERYCTRL(r1, 0xc0445624, &(0x7f0000000040)={0xc9, 0x107, "af5436787ab18af5cc34f141108dfe078819ea82126c625221e5012cbc96001c", 0x8, 0x1, 0x6, 0x3ff, 0x4}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) r2 = syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x0, 0x2) accept$alg(r2, 0x0, 0x0) 20:04:37 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0008000}}) 20:04:37 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="78667303", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:37 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:37 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000a0}}) 20:04:37 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f00000000c0)={0xffffffff, 0x7, 0x81, 0x38, 0x4}) r2 = socket(0xa, 0xe, 0x3ff) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f00000002c0)={0x8, &(0x7f0000000280)=[{0x5, 0x6, 0x4, 0x5d0e}, {0x2, 0x2, 0x1, 0x3}, {0x2, 0x4, 0x9, 0x6}, {0x8, 0x8, 0x4479, 0x8}, {0x400, 0x933, 0x3ff, 0x7}, {0x8, 0x4, 0x3ff}, {0xffffffff80000001, 0x40, 0x15, 0x8}, {0x100, 0xfff, 0x100000001, 0x1}]}, 0x10) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x82800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r3, 0xc008ae05, &(0x7f0000000300)=""/33) readv(r0, &(0x7f0000000580), 0x1) ioctl$VIDIOC_SUBSCRIBE_EVENT(r3, 0x4020565a, &(0x7f0000000100)={0x8001004, 0x4}) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f0000000200)={0x8001003, 0x8, 0x3}) ioctl$PPPOEIOCDFWD(r2, 0xb101, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000440)={{0x87, @multicast2, 0x4e22, 0x3, 'dh\x00', 0x10, 0x2, 0x7a}, {@dev={0xac, 0x14, 0x14, 0x18}, 0x4e20, 0xb8c0c7150f0cf26d, 0x100000001, 0xfffffffffffffffb, 0x6fac38fd}}, 0x44) 20:04:37 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:37 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0008000}}) [ 2924.598575] XFS (loop3): SB sanity check failed [ 2924.643533] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2924.698715] XFS (loop3): Unmount and run xfs_repair [ 2924.711634] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2924.736096] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ 20:04:37 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0xfffffffffffffffd) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904, 0x3}) ioctl$VIDIOC_G_CROP(r1, 0xc014563b, &(0x7f0000000080)={0x9, {0x100000000000000, 0x401, 0x6, 0x401}}) r2 = fcntl$dupfd(r0, 0x406, r1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e21, 0x6, @loopback, 0xffffffffffffff80}}, 0x6, 0x9}, &(0x7f0000000240)=0x90) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000280)={r3, 0x6, 0x30, 0x80000000, 0x9}, &(0x7f00000002c0)=0x18) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x7, 0x0) [ 2924.769084] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2924.799669] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2924.817374] XFS (loop2): SB sanity check failed [ 2924.822541] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2924.826460] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2924.877658] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2924.890825] XFS (loop2): Unmount and run xfs_repair [ 2924.898412] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2924.907690] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2924.908898] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2924.918533] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2924.931187] XFS (loop3): SB validate failed with error -117. [ 2924.932684] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2924.945814] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2924.954598] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2924.963175] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2924.971349] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2924.979883] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2924.988318] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2924.996978] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2925.005475] XFS (loop2): SB validate failed with error -117. 20:04:38 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x1000000000000000}], 0x0, 0x0) 20:04:38 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000a0ffffffff}}) 20:04:38 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000280)='/dev/video#\x00', 0x4, 0x80100) r1 = add_key(&(0x7f0000000140)='rxrpc_s\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)="eaaa6d661dfcca", 0x7, 0xfffffffffffffff8) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x80000, 0x0) write$UHID_DESTROY(r2, &(0x7f0000000340), 0x4) keyctl$assume_authority(0x10, r1) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x408002, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[{0x0}, {}, {}, {}]}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000240)={0x4, [0x629caa8f, 0x3, 0x9, 0x5]}, 0xc) ioctl$DRM_IOCTL_SWITCH_CTX(r3, 0x40086424, &(0x7f0000000100)={r4, 0x3}) 20:04:38 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:38 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0008000}}) 20:04:38 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:38 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x3000000}], 0x0, 0x0) 20:04:38 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0xf6ffffff}], 0x0, 0x0) 20:04:38 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:38 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000280)={0xfffffffffffffffd, 0x100, 0x2}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)=0xfb) 20:04:38 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000a0}}) 20:04:38 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x4000000}], 0x0, 0x0) [ 2925.436947] XFS (loop3): SB sanity check failed [ 2925.441982] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2925.473534] XFS (loop3): Unmount and run xfs_repair [ 2925.485704] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2925.489106] XFS (loop2): SB sanity check failed [ 2925.497185] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2925.498040] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2925.510241] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ 20:04:38 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) eventfd(0x8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2925.543671] XFS (loop2): Unmount and run xfs_repair 20:04:38 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000040)={0x5, @sdr={0x777f5f5d, 0x1}}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x7, 0x198f904}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x1, 0x0) ioctl$BINDER_SET_MAX_THREADS(r1, 0x40046205, 0x81) [ 2925.572582] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2925.593489] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2925.604620] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2925.633602] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2925.654701] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2925.672337] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2925.682565] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2925.693149] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2925.696283] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2925.710118] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2925.713686] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2925.724670] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2925.735148] XFS (loop3): SB validate failed with error -117. [ 2925.737759] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2925.749711] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2925.758106] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2925.766379] XFS (loop2): SB validate failed with error -117. 20:04:39 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:39 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x200000000000000}], 0x0, 0x0) [ 2925.907581] XFS (loop2): SB sanity check failed [ 2925.916480] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2925.928473] XFS (loop2): Unmount and run xfs_repair [ 2925.934216] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2925.942734] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2925.960867] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2925.971223] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2925.982817] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2925.991151] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2925.999606] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2926.008192] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2926.017150] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2926.025626] XFS (loop2): SB validate failed with error -117. 20:04:39 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="7866731e", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:39 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000001c0)=0x0) sendmsg$nl_generic(r0, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4080020}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES32=r3], 0x130}, 0x1, 0x0, 0x0, 0x40000}, 0x40) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000040)={0x0, @bt={0x9, 0x1f, 0x0, 0x2, 0x8001, 0xfffffffffffffff8, 0x9, 0x401, 0x20, 0x7, 0xffff, 0xfffffffffffffffd, 0x1a61, 0x2, 0x10}}) ioctl$VIDIOC_S_EDID(r0, 0xc0285629, &(0x7f0000000240)={0x9, 0x1, 0xfffffffffffffe76, [], &(0x7f0000000200)=0x100000001}) 20:04:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x7, 0x20000) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) 20:04:39 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x1000000000000}], 0x0, 0x0) [ 2926.056837] XFS (loop3): SB sanity check failed [ 2926.061590] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2926.084109] XFS (loop3): Unmount and run xfs_repair [ 2926.089179] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2926.127651] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2926.153090] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ 20:04:39 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='/dev/rtc\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f00000000c0)={0x10000, 0x80a, 0xabb, 0x3}, 0x10) 20:04:39 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0xa0008000}], 0x0, 0x0) [ 2926.186598] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2926.196814] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2926.207905] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 20:04:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2926.234509] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 20:04:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/202, 0xca) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) [ 2926.281248] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ 20:04:39 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x3f000000}], 0x0, 0x0) [ 2926.326901] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2926.354903] XFS (loop3): SB validate failed with error -117. 20:04:39 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:39 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4) 20:04:39 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) ioctl(r0, 0x101, &(0x7f0000000280)="6c1202d13fa3a07867d45d2f7260b8467b423fcdb5f017298ff0d9ecd7703c8c4e8c846451e538838c5c5a2a7fd6c6c58f2b9616b52b35d538166e49008b8a895ba632a68f90d3c73741803d638a09619e61a1c0a2d0bb9bb761aae279561d39040ab37be9be949b37f148dc6d8575ba4e321fbfc909fe0c857c904efdd6639de086b870353b85dc7d671c088b689851d6ded99b4987207ee4119620a2c35f1b6e702ede7d06") r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e23, @broadcast}}, 0x7fffffff}, &(0x7f0000000400)=0x90) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000440)=@sack_info={r2, 0x9, 0xdf3c}, &(0x7f0000000480)=0xc) r3 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x7, 0x100) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000340)={0xfffffffffffffffc, 0xfe9e, &(0x7f0000000380)="48f23f1407d0cd5bca5ae1ea66189bd0ffad245f2eb4995117d38ce84719f3ebefcd8a3dc4202c4f983ce8b540588109e436d8cca26df48855eb9ad5cd7cd821b16d797b7aafc8475392"}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x4000, 0x0) bind$unix(r4, &(0x7f0000000080)=@abs={0x1, 0x0, 0x4e20}, 0x6e) ioctl$sock_inet_SIOCGIFDSTADDR(r4, 0x8917, &(0x7f00000004c0)={'nr0\x00', {0x2, 0x4e21, @multicast1}}) 20:04:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:39 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x1000000}], 0x0, 0x0) 20:04:39 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) [ 2926.566228] QAT: Invalid ioctl [ 2926.576809] QAT: Invalid ioctl 20:04:39 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x300}], 0x0, 0x0) 20:04:39 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x402, 0x0) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) 20:04:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x100000000, 0x80) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000080)) [ 2926.697319] XFS (loop2): SB sanity check failed [ 2926.702377] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2926.732260] XFS (loop2): Unmount and run xfs_repair 20:04:39 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x8}], 0x0, 0x0) [ 2926.762255] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2926.771025] XFS (loop3): SB sanity check failed [ 2926.779192] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2926.802282] XFS (loop3): Unmount and run xfs_repair 20:04:39 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x101000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee60, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xae03000000000000, &(0x7f0000000140)={0xa, 0x5, 0xb, 0x13a}, 0x2c) ioctl$RTC_WKALM_SET(r2, 0x5452, &(0x7f0000000000)={0x2}) [ 2926.807489] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2926.842256] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2926.842524] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2926.865174] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2926.868968] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2926.893872] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2926.895472] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2926.912382] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2926.934262] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2926.952312] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2926.961315] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2926.970366] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2926.981142] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2926.989525] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2926.989569] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2926.997909] XFS (loop2): SB validate failed with error -117. [ 2927.015073] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2927.024265] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2927.032986] XFS (loop3): SB validate failed with error -117. 20:04:40 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="78667302", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x401, 0xfffffffffffffffe) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) 20:04:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:40 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x8100000}], 0x0, 0x0) 20:04:40 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x20000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000040)={0x0, 0x0, {0x100, 0x22, 0x2, 0x0, 0x0, 0x6, 0x0, 0xb9}}) 20:04:40 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:40 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x200000000400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) 20:04:40 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x4}], 0x0, 0x0) 20:04:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdffffff]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:40 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x800800000000}], 0x0, 0x0) 20:04:40 executing program 4: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x4000, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x40000, 0x12) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f0000000600)=0x4) ioctl$KVM_GET_MSRS(r1, 0xc008ae88, &(0x7f0000000580)={0x6, 0x0, [{}, {}, {}, {}, {}, {}]}) sendto$llc(r0, &(0x7f0000000380)="0d8798b4c4e7025a9f553521f7cc67e055c6630668c456a2597311850333e789d017e1ca689a2ab176362974665a0602b0c2d5de5e3b8d5167b294dde8dfe1733ab12b42717f1560e1e787972dc7ab58cff8615f34815bcda5761c3e3786dab6a1a8d30db442ae3ff0ef4d7b7b55df997f70d5c9f352ae16197b8d07c465fd5b8786d7cfba8d30bb3ce8738ee829e28817a9d162e6779132f3633aff32ef162f72fb1cf6bf64b07a1f0e620d7d9c6cc8962f61642cdab6ee470d39405e9c470e7f28e3446c7dd1f324", 0xc9, 0x4000010, &(0x7f0000000480)={0x1a, 0x0, 0x5, 0x7fffffff, 0x941, 0x2, @local}, 0x10) read$eventfd(r1, &(0x7f0000000040), 0x8) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f00000004c0)={0x7, {{0x2, 0x4e24, @multicast1}}}, 0x88) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000140)=r1, 0x4) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000240)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc0585604, &(0x7f0000000080)={0x1, 0x2, {0x2, 0x9, 0x701f, 0x8, 0xb, 0x6, 0x1, 0x5}}) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0x8008ae9d, &(0x7f0000000280)=""/216) dup3(r2, r2, 0x2000000080000) ioctl$RTC_WKALM_SET(r1, 0x5452, &(0x7f0000000000)={0x2}) 20:04:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x100, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000080)={0x0}) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)=0x0) r3 = geteuid() r4 = getegid() write$FUSE_ATTR(r0, &(0x7f0000000640)={0x78, 0x0, 0x8, {0x5, 0x81, 0x0, {0x0, 0x1, 0x1, 0x3, 0x7, 0x400, 0x3, 0x80000001, 0x10000, 0x8, 0xa77, r3, r4, 0x4f36, 0x3ff}}}, 0x78) ptrace$cont(0x29, r2, 0xfffffffffffffb05, 0xf85) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x58, 0x0, &(0x7f0000000240)=[@increfs_done={0x40106308, r1, 0x2}, @transaction={0x40406300, {0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40, 0x8, &(0x7f00000000c0)=[@fda={0x66646185, 0x6, 0x0, 0x38}, @fda={0x66646185, 0x8, 0x0, 0x1e}], &(0x7f0000000100)=[0x40]}}], 0xfe, 0x0, &(0x7f00000002c0)="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"}) r5 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000003c0)={0x1d5f, 0xff, 0x2, 0x5, 0x9, [{0x4, 0x1, 0x632, 0x0, 0x0, 0x82}, {0xffff, 0x20, 0x200, 0x0, 0x0, 0x100}, {0x2, 0x8000, 0x3, 0x0, 0x0, 0x2000}, {0x1, 0x4, 0x0, 0x0, 0x0, 0x1000}, {0xe0, 0x6, 0x400, 0x0, 0x0, 0x1400}, {0x5, 0x400, 0x6, 0x0, 0x0, 0x800}, {0x0, 0x2, 0x100000001, 0x0, 0x0, 0x2005}, {0x4, 0xfffffffffffffffa, 0x4, 0x0, 0x0, 0x900}, {0x8000, 0x6, 0x100000000, 0x0, 0x0, 0x8}]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$VIDIOC_SUBSCRIBE_EVENT(r5, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) [ 2927.420817] XFS (loop2): SB sanity check failed [ 2927.425972] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2927.443390] XFS (loop2): Unmount and run xfs_repair [ 2927.448429] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2927.455223] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2927.463771] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2927.471931] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2927.480579] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2927.489081] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2927.497282] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2927.505510] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2927.513799] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2927.522096] XFS (loop2): SB validate failed with error -117. 20:04:40 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:40 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x2}], 0x0, 0x0) 20:04:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:40 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:40 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x80001, 0x0) perf_event_open(&(0x7f0000000180)={0xffffffffffffffff, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, &(0x7f0000000780)) r3 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) fsetxattr$security_smack_entry(r3, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f0000000280)='IPVS\x00', 0x5, 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r2, r3, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x8000000000044000) io_setup(0xb, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000680)=0x9) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x0) ioctl$TIOCGETD(r3, 0x5424, &(0x7f0000000300)) ioctl$LOOP_CLR_FD(r2, 0x4c01) r6 = creat(&(0x7f0000000640)='./file0\x00', 0x114) open(0x0, 0x40, 0x140) syz_genetlink_get_family_id$team(&(0x7f0000000740)='team\x00') accept$packet(r6, 0x0, &(0x7f0000002340)) getsockopt$inet6_mreq(r6, 0x29, 0x0, &(0x7f0000004140)={@local}, &(0x7f0000004180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r5, &(0x7f0000004a40)={&(0x7f00000006c0), 0xc, &(0x7f0000004a00)={&(0x7f0000004240)=ANY=[@ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040005000000080007000000000038000100240001006e6f746966"], 0x1}}, 0x0) r7 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r7, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) 20:04:40 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0xffffffffffffff7f}], 0x0, 0x0) 20:04:41 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2927.873953] XFS (loop2): SB sanity check failed [ 2927.878844] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2927.890479] XFS (loop2): Unmount and run xfs_repair [ 2927.895750] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2927.903037] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2927.911584] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ 20:04:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4601, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1106, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x480, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000300)={0x6, 0x3, 0x4, 0x0, {r1, r2/1000+30000}, {0x4, 0xc, 0x400, 0x6, 0x3ff, 0x401, "2e6eb00e"}, 0x3, 0x7, @fd=r0, 0x4}) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000140)={0x6, 0x7f}) r3 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r3, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) ioctl$VIDIOC_OVERLAY(r3, 0x4004560e, &(0x7f0000000040)=0x1) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x24a80, 0x0) ioctl$VIDIOC_ENUMOUTPUT(r3, 0xc0485630, &(0x7f0000000380)={0xa16b000000, "dc2ca32d1335d2f6f88275afb2913f5a2a435f96ae4ab12c27efd6705f5841e3", 0x3, 0x3, 0x4, 0x50007, 0x2}) write$P9_RLOPEN(r4, &(0x7f00000000c0)={0x18, 0xd, 0x2, {{0x20, 0x4, 0x6}, 0x3}}, 0x18) [ 2927.920274] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2927.929653] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2927.938130] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2927.947192] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2927.955753] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2927.964416] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:04:41 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0xfcfdffff}], 0x0, 0x0) [ 2927.973331] XFS (loop2): SB validate failed with error -117. [ 2927.998617] XFS (loop3): SB sanity check failed [ 2928.003638] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2928.003651] XFS (loop3): Unmount and run xfs_repair [ 2928.019986] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2928.027499] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2928.035921] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ 20:04:41 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) [ 2928.044295] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2928.054647] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2928.063055] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2928.071334] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2928.079748] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2928.088214] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2928.096622] XFS (loop3): SB validate failed with error -117. [ 2928.287778] XFS (loop2): SB sanity check failed [ 2928.292750] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2928.304374] XFS (loop2): Unmount and run xfs_repair [ 2928.309401] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2928.316127] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2928.324315] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2928.332514] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2928.340707] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2928.348983] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2928.357167] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2928.365381] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2928.373542] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2928.381818] XFS (loop2): SB validate failed with error -117. 20:04:41 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_SUBDEV_G_SELECTION(r0, 0xc040563d, &(0x7f0000000040)={0x1, 0x1000, 0x102, 0x6, {0x1f, 0x70, 0x0, 0x372e}}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) 20:04:41 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:41 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0xfffffdfc}], 0x0, 0x0) 20:04:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x6000, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x2, 0xfffffffffffffc01, 0xfffffffffffff000, 0x2, 0x6, 0x1ff, 0x40, {0x0, @in6={{0xa, 0x4e20, 0x7, @mcast2, 0xffffffff}}, 0x2, 0x1, 0x3, 0xec, 0x8001}}, &(0x7f0000000140)=0xb0) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000240)={r2, 0x9545}, 0x8) 20:04:41 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:41 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)) 20:04:41 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x400000000000000}], 0x0, 0x0) 20:04:41 executing program 5: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)=0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x40, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) ioctl$PIO_SCRNMAP(r2, 0x4b41, &(0x7f0000000240)="443a5fa5801006d9523eb2a13a53e088f0699ec3f46e30d5501bc6982d3c9ecaaf56cb7ac6a68343d4cae2b405ef2a0c826fc00e43ea19a33e3daca5c54c3d64479444afa9ef1e792433bfa892c52e7d6d229ea9a16589c9572023edfeb09994bd0e2854a70f37891bc462c1b73cbefeb4342138c0e0cdf429342c58ccebedcbae0673ed60") 20:04:41 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:41 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2928.661920] XFS (loop3): SB sanity check failed [ 2928.667777] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2928.701706] XFS (loop3): Unmount and run xfs_repair 20:04:41 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x500000000000000}], 0x0, 0x0) 20:04:41 executing program 4: mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = accept4$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f0000000080)=0x1c, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x7) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000001c0)={0x0, 0xa9, 0x9, [0x8, 0x8000, 0x9, 0x1, 0x8, 0xf17e, 0x3, 0x18f68000000000, 0x1]}, &(0x7f0000000200)=0x1a) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000240)=@sack_info={0x0, 0x8, 0x800}, &(0x7f0000000280)=0xc) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f00000002c0)={r3, 0xe0000000000000, 0x3, 0x1a, 0x7ff, 0x3, 0x7, 0x2, {r4, @in={{0x2, 0x4e23, @remote}}, 0x6bb, 0x80000001, 0x4, 0x9af, 0xff}}, &(0x7f0000000380)=0xb0) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x7ffffffffffe, 0x0, {0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xdf}}) fdatasync(r1) openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x800, 0x0) [ 2928.713417] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2928.720323] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2928.729294] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ 20:04:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x212000, 0x0) getsockopt$netlink(r0, 0x10e, 0x8, &(0x7f0000000340)=""/4, &(0x7f0000000380)=0x4) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000080)={0xffffffffba57fe1e, 0x2, @value=0x8}) getsockname$unix(r0, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) connect$vsock_stream(r0, &(0x7f0000000300)={0x28, 0x0, 0x2711, @hyper}, 0x10) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000002c0)=0x0) perf_event_open(&(0x7f0000000240)={0x5, 0x70, 0x3, 0x7, 0x69, 0x7, 0x0, 0x1, 0x1000, 0x4, 0xffffffff83a7b289, 0x8001, 0x6d, 0x81, 0x1ff, 0x2, 0xfffffffffffffeff, 0x2, 0x9, 0xfff, 0x8, 0x1, 0xff, 0xffffffffffff0001, 0x3, 0xffffffff, 0x4, 0x7, 0x9, 0x8, 0x20, 0x6, 0x0, 0x8001, 0x400, 0x1000, 0x4, 0x0, 0x0, 0x6, 0x6, @perf_config_ext={0x1f, 0x9}, 0x4, 0xea, 0xfffffffffffffff9, 0x4, 0x5, 0x1, 0x5}, r2, 0x6, r0, 0x0) [ 2928.764389] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2928.791648] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ 20:04:42 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2928.821912] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 20:04:42 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x101100, 0x0) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000040)) 20:04:42 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0xffffffffffff0700}], 0x0, 0x0) [ 2928.866595] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2928.879504] XFS (loop2): SB sanity check failed [ 2928.892400] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2928.915587] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2928.947481] XFS (loop2): Unmount and run xfs_repair [ 2928.949860] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2928.959066] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2928.968031] XFS (loop3): SB validate failed with error -117. [ 2928.989986] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2929.024496] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2929.068041] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2929.082661] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2929.090949] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2929.107476] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 20:04:42 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="786673c0", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:42 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x300000000000000}], 0x0, 0x0) 20:04:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/current\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) r3 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x9, 0xb, 0x4, 0x808, {r1, r2/1000+10000}, {0x4, 0xa, 0x7, 0x1, 0x7, 0x8001, "2ac96434"}, 0x8, 0x5, @fd=r3, 0x4}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) 20:04:42 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2929.130920] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2929.139797] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2929.150483] XFS (loop2): SB validate failed with error -117. [ 2929.298249] XFS (loop2): SB sanity check failed [ 2929.303755] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2929.315100] XFS (loop2): Unmount and run xfs_repair [ 2929.320145] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2929.327254] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2929.335440] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2929.335450] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2929.335459] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2929.335468] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2929.335477] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2929.335486] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2929.335500] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2929.360300] XFS (loop2): SB validate failed with error -117. 20:04:42 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:42 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000280)={@random="cd390b081bf2", @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}}}}}}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x3, 0x40000000000000, 0x0, 0x2000000000001, 0x7}}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f00000001c0)) init_module(&(0x7f0000000040)='vboxnet0\x00', 0x9, &(0x7f0000000080)='/dev/rtc\x00') 20:04:42 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x8000000}], 0x0, 0x0) 20:04:42 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f0000000240)=""/4096) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) 20:04:42 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19ed3fca4b020000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:42 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:42 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0xfffffffffffffffc, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) 20:04:42 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x1008}], 0x0, 0x0) 20:04:42 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x500}], 0x0, 0x0) 20:04:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) 20:04:42 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:42 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0xfffffffe}], 0x0, 0x0) [ 2929.724974] XFS (loop2): SB sanity check failed [ 2929.740172] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2929.757834] XFS (loop3): SB sanity check failed [ 2929.777109] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2929.813850] XFS (loop2): Unmount and run xfs_repair [ 2929.828100] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2929.835524] XFS (loop3): Unmount and run xfs_repair [ 2929.840808] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2929.849533] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2929.856986] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2929.865697] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2929.886934] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2929.900814] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2929.909381] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2929.917959] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2929.921133] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2929.935032] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2929.936592] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2929.944782] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2929.960150] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2929.960750] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2929.970803] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2929.977140] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2929.993793] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2929.995485] XFS (loop2): SB validate failed with error -117. [ 2930.003842] XFS (loop3): SB validate failed with error -117. 20:04:43 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="78667303", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:43 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f00000000c0)=0x1008000, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000040)={0x2, 0x1f}, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400201) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x1b32, 0x105000) ioctl$PPPIOCGL2TPSTATS(r2, 0x80487436, &(0x7f00000001c0)="444054c2735e6219325c5e90a741ce6bdf607685d3c68296cd83f24025960fdb871befd347ba7376a41071c691bfe64a9735f1b8023b878dabc573fea288554b668816b4755dd73611067664300b4626e68b99f6639693129bf471c2125eceec4c531f2da5492151d4d33da5a605446281f949453c4db591e837ac93dd5178dbb5649b68949f47cffd4dbb6ff9b20b6b8a24b62d8e42aec51d3d18bf770d7732a7fe8ab433be62277ab3e3a07b9eecc90695013b7b242eaaaec3d8badf0ac4725a35d4fe65aa7216e70dc86213") ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) 20:04:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:43 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x7ffffffffffff}], 0x0, 0x0) 20:04:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x100000001, 0x2000) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x5, 0x0, 0x10000, 0x4}) ioctl$DRM_IOCTL_AGP_FREE(r1, 0x40206435, &(0x7f00000000c0)={0x8, r2, 0x10001}) 20:04:43 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="7866730f", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:43 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x100000000000000}], 0x0, 0x0) 20:04:43 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_VL_CLR(r0, 0x7014) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) 20:04:43 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x9, 0xffffffffffffffff) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x8, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80080, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000100)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000040)={0x3, 0x98f904, 0x4}) 20:04:43 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x8000000000000000}], 0x0, 0x0) 20:04:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:43 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f0000000080)) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f00000000c0)={0x2000000002, 0x0, {0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x2000000000}}) 20:04:43 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfsz', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:43 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) fdatasync(r0) 20:04:43 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x4000}], 0x0, 0x0) 20:04:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:43 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) 20:04:43 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x100800000000}], 0x0, 0x0) 20:04:43 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:43 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:43 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) 20:04:43 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) 20:04:43 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x7fffffffffffffff}], 0x0, 0x0) 20:04:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:43 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0xffffffffffffffff}], 0x0, 0x0) 20:04:43 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(r1, 0x401) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$DRM_IOCTL_FREE_BUFS(r0, 0x4010641a, &(0x7f0000000140)={0x2, &(0x7f00000000c0)=[0x5, 0x10001]}) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0xfffffffffffffffc, 0x4}}) write$binfmt_misc(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="73797a30989a4d469da9be9a3273d2e80f2eb115656d9b3acfb5b2895a9ce9ad6e43ad7ada8381841256d04c63e27d72f5ea7bf77c4a3aaa316ce15df296c806d5f5ab3dda99eeb22e93bf4ba80a28aa7147e21db3ea29a9b8291ba55350765a1d35c429bdc23a3d2c79f2c81947ee1ae2936acd3e513160ba5cf49d94c86e079db90c2bf99849d3b4fda51880af9f91149fef7ac7b7ed6869edd6fa84e4dbbae90ec0957fc03a47"], 0xa8) 20:04:44 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000080)) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x400800) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000200)={0x1000008001005, 0x7}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e24, @local}}, [0x3, 0x3, 0xffffffffffffbbb4, 0xfffffffffffffff7, 0x0, 0x81, 0x4, 0xc59, 0x8a, 0x1, 0x200, 0x80, 0xffff, 0x7, 0x4]}, &(0x7f0000000140)=0x100) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000340)={r3, 0xb5, "233998c66d98e8503bb3c5c51f010985af464080cb6e0cff8fac95c933a8a9cd4555031712a3fc52b4797f439992e777de72758a98a81dcd682d61412be3d47d5f49e1f63b042e22df24e0724ca007b7115b1c65a8ba3b36d4bdfe07de6537ca31e1d32d77e29601dc429d81df8032d642dc3a31fe73b2f6c2b85cc0c56f23828d772c7e271a6c29de1724dbd9ffb577fdd69eddf1767b03e26429c7bb392cc009bf61d1ad8850906095eaa9d4f61c4bba8e7ba769"}, &(0x7f0000000400)=0xbd) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f00000000c0)={0x7, 0x5}) 20:04:44 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x1, {0xffffffffffffffff, 0x33, 0x0, 0x0, 0x8, 0x0, 0x2}}) [ 2930.933082] XFS (loop3): SB sanity check failed [ 2930.951822] XFS (loop2): SB sanity check failed 20:04:44 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2930.976767] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2930.995052] XFS (loop3): Unmount and run xfs_repair [ 2931.000388] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 20:04:44 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x8000a0ffffffff}], 0x0, 0x0) [ 2931.031791] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2931.052680] XFS (loop2): Unmount and run xfs_repair [ 2931.068678] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2931.082214] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2931.109077] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2931.126983] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2931.137795] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2931.177817] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2931.202871] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2931.211048] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2931.227415] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2931.233625] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2931.244320] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2931.254779] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2931.263418] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2931.268600] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2931.273097] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2931.288301] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2931.288885] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2931.297261] XFS (loop2): SB validate failed with error -117. [ 2931.308700] XFS (loop3): SB validate failed with error -117. [ 2931.425514] XFS (loop3): SB sanity check failed [ 2931.430319] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2931.442057] XFS (loop3): Unmount and run xfs_repair [ 2931.449228] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2931.456042] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2931.464263] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2931.472503] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2931.480639] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2931.488864] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2931.497030] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2931.505203] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2931.513384] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2931.521616] XFS (loop3): SB validate failed with error -117. 20:04:44 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs ', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:44 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000001c0)={0x6c80000000000, 0x80d, 0x5, 0x0, 0x0, [{r0, 0x0, 0x3}, {r1}, {r0, 0x0, 0x8}, {r2, 0x0, 0x703}, {r0, 0x0, 0x101}]}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000040)="efa67999b974a82414acf87f372f", 0xe, 0x800, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) 20:04:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) r1 = socket$inet(0x2, 0xa, 0x7fffffff) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000040)={0x0, 0xfffffffffffffff7, 0x30}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000000c0)={r2, 0xefd}, 0x8) 20:04:44 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0xfeffffff00000000}], 0x0, 0x0) 20:04:44 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:44 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:44 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0xffffffffa0008000}], 0x0, 0x0) 20:04:44 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@loopback, 0x58, r2}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmmsg$alg(r0, &(0x7f0000003480)=[{0x0, 0x0, &(0x7f00000024c0)=[{&(0x7f00000001c0)="ea183996c9854ae1334fa37871c6e0e16637f2da270717763836601954a07da30a7f7de36f0b35c9250d61edaaddabb34cf532644f5f6449ff70b7fd797f6b426f88a9d7765312d3ca8ff7a8a6e290a4878a16589f053a056f5c3cf9079763ed717cf14532ed747a4c0d3e17550b7f31f9374a0677d3516916651c2408580a7c02be9606067d66e0f08a0ad673e368f9e1b9c93d55576e736d596cfea95d7ca506778dec1bbd21f844f508fa429c15f6db29670694be84362dd09c85e17f3edaddfb9c7efc9a5a432e9c78f1610622c47b69a4fc0ac15d7d50e47805df2adb4c312c172e4c04f00a69e9fb10bee8af920ac31edcc4a0c908c20d421e41e702328e28431e0ecee7e6b744bc22523467931a2455660fbc4d6328216a850cdc931f339897ad371b1d473ea73dfed360cc773b545232e01423b678c49f768c9a58736a3a5e9b512559e92dda2ba10c3914eb03a9d0c2b5bb381f81eeae7dce4d2ef2b0bcdc0b798facd0483807d591373aa9b870b19fd5db885552e8926fb2bf65be4c659e809a2100cf93aa032125dd0f3357869db67e16f02258f8b50614830cfcf6e753a6181be94cd1adf866a90d52f5a2e154ad6f123bee4615a32d9aba441866ac87b41ba3ad2aafc78a112e0694ebd35d32ccbf745f416db7d2797fd259e7c051bffc4b0739af2696e2e3440fe3207e0d50f80b4bc39f75db6766811c298bb473ae1ec6c859c7bd38c11047b55762953d702aeff7619ab13a6115ca3c2b4fb404d94676292ab46938171969dbc2868c2f78bb404fef3e3c78717a708bd2a1e3ea8433af40cd094e25bea45b0b3e570cd02011dde48b274a33f79bdfe191fe033d3f9947ff9c6b6e25671f43af2f9429a29703129005e506a9525b760fda4529365320ab0ba4ae62b4d63c4d5d72b2b47ecaeedfff6bff3f4ba77da091207fbb005d130991e9bab14fa05ce9a42894870c3ff2ac532059a80da6fffd0dfac3719326879ae48c88fc842cf83819eb3e50b0b2fe886c0dc490cbeb9269398396a969633949255550cc778e465ce7cc3ba0898e1554b97aa60893958c41c0b4e9970cf96cb52d4407957ed6aa03971204b51b7a43dc4bfe86985abea2908590355e31bc6dc4493b9037292bc21bed01a7b95900e408d3a77b98e13ef6444428f3b2a35dc4bf31595827378830621f1ddd6502c649d3794990179144008c5e3ecd7f4fef2ee0c4cb436b06564acf4675ab2359a34f559463c58dd8aa74fcd7ce622cc14fcf1f30d7448c44a725bb428615997c693335cfc21d73022a63d6a5d1dced121a1c1339e899da6becb3b7b47c24298bc213cf42b06ba960cc6fa91796d9506318b98158236991afe2383637b6b3332333fc622339df718ef4dfb89ed838a4ee304d20883ba16e93ec1070796cda1c461fe2503947ad48827ea2ca69e4c222f32fa7313e064b5300f93e9993b557caecb9697ef11c8a1d38ab706547b079b03cd096e78a75ad4d226beca82470639291fe7ce2248ba84709a2ab9574d5c1f878554ceb4182ce117bc582062764a700039b691082d0cf348f9d0a4c8cabd25014208d112d4006c9d8a18cb6e4c0d30bf07ade26425e7c7dcd1b2186fb9529b0fda01a798049ccfda4f21350be5d5b91a57c8f1e0f6e14bdfdbe17b18ee46aff1eaf187403d8114231a7856f15fcddad0d24f7009f6133ccd106cb9548b3806169250a136cae1f901180101fd8abc07be8672b49873d2a12e40a5848107ce0ea8744de0706d19c9347ca413d2a518db66edc104d8b877bec16118da191f827db7a5a297439f4f9fde8de6747f3fd6ccf62e6dcfa5197ae59fafff74b945727eaf173534d0b7a180e4931e48a50850029633b5802f44e067939b5d5252bbb19ccf6ca47a137745820d650ff9361af754a878eaa0565e78b61a6080643bb10fcb3fa6f5196548a654d0a39a1a15f9060edcb57fcd80fb4d961877b321246191f05c75d3f2862d295a6a990370e88a24e82b0e1a8ed21fbe1ad3c9b365878b210feef693bc07768954b462e2136cf6b496cc6678391bd94f0a2873233e3ade27c2d9c3c05bbcce2cd39221bd5120bf4d6d904b87a9f76313bf73b867ce7ee3ad881cab7875b21ccca6fba09c69bce26165c53bb7aaec923449ebdaaa1e60e073e9fd18af04a362461e6d9cac8411eb621b39e8d296b24a59d5aca58877edecc4ecfe81b67341ebb295d3b32352f02488b4b1eedd67787eaeba60329e982628929ee5ab15ce13e96bd996549264e9106d860ecd91b80e9e5bcda9e791a687724d1697a2fbfe80bb13a8b5be5a19af812dbe86c64ee43b3dea79ef87a9ee852d8419dbe613f864ebc02fccc73235783a9acb004444063b40b1a9f495425abe4499bc7d8fccde970ef0c5d72bfa15ebd1fb3139a587abe91479c24e9507aade2a1bc5d8c5479b0d2c45dc94314e818a481ed6ca87b63471a48609a5443a2d0a735a5d37a1f32fbe8422fe0e94fd63b4549cc7dfd5ad596ca3589c82dd1ba557f3826340c6c2f7d87db6676464319b7e3ebb44bc4c88b8fab69f133eca55f11f49e178ad8a8a0961a4335afdada77602a9f4736371365ef7249ce0d68947b45ace232128ffcf5dc48237e3371446613d3f04098cb6affe769ba83d3abf3ebb846b9e152ba154d5574e3e2a5b805c00e66e4f4344f56291180ba0a348a523136f120fdcc5bc0b1f9bdcbedf1cfdc04ef6e5202a5d9176434d554353bb1a1994f129c76a37b4be577d70c2bf0f048e8875b59932355830232d0fb51b36579025c6fb9d2ad83ebefce49f794a65e8af2d93e438f87b5892c8964ac25e54476262e31c387b5cae7a3c51ab0ef092b8b522a73f6b855b5220c53f6caf06b7b20a74fed5547bbe7391b4dfe5f81cff64f0889c0c9a5ec9c8ffeed12777deea87927c7995f195088c983577178a3134fc2b86b06cb781c43534817c7553b703657c2659b022012eebe6f87bb3cb888172f30496bc23f85ce09abbf008cc23bde132b741a128f1122bbb4360ccba15d9d73340a6e686c80e0e48171fa123dacfd40839fdab5b3dc4fb78b48cca9184667c081347e7c6b1bba323739e4a872f01ab85f677898415c5635f9a3ca92ee9b85d8ef2a55ebfd627c96cbcf5c94e7c9690ab15fac2dc30e52156b0ee40b87ad990713fb6f4aa13f11712ea2adf1968d20fc7344b27fe04de9f5107b4666a8f15867cda9d8de748bf90a4a58d0344f385e513736740fbe9152820c7d430327622b1d7f646ea069e21461f8ad949a846a1f70fceb2b7c263241163fd0b17040c1029091cb4987ccc1cbeb119ea0d213f857f29260a0ab9ef23b754e3059f73525bf0c9207ae67801e6dc35439bc4405e65ad284af8292f64bf1fd87329a6703087ff7ca0f5fce5e54d9ae4b609ffdfe8e02fd8528a885f34428807a9bb530c2188675a0ad3e22eceaefb5a7fe919bb780dbe2062d17b08ffb18b00f7f5d62dce33580cc3357b8300cc7561c625e4d65998e719036e4373db778c9eb3fb23f39a0cf2a181743a06113657c26ecc8ef3f12ffcb3d051c6c17fdffc36beb6e9ae2656a25ece296b424b9654e29e5d07ba25a93f1b7e0464e81efd6df822265fc243f8046d893900832141455b5dd7995b78ddc2d7aee1d414deccd032f41a42940e3f5124a3a2eba04dcbb6e9fa47cd655853729bec38fd13c97a96fb02b4e8fdb3e84a91d05565901531548c944fa4962b146675b7f5df6236858881152983d14fb35635c4579277e93daefea99a91756ab82a6bf636e791fe61d5d06bdd943114e50bb688cf420a23697709841f1f1a0f86f49da3cb05f34daa95e3c623b4a24ceb00b2c72f056365d04c36f0f0c1f9ebaf761f4e745e7c952c87c8c292dffaa030dc37bfe9e50b71d9bfa3be552efeb37e052caf3ccf77cb1caf1c5f395e135a7d281ffbb818887d22f36fd4f94e08afd1ec98c647ad7117bef5ef1f377be172732831c0ccb43b1fe86a2aedfb64cc58e4a31a684c053168529806399e800425094ef28e939be805f5dfca6dd323ab761df6957fcba0e07eed1cbe9e50b25c8aeed05d296a2035c36a1f3c7815f9ec73a8fbbe0911414ea53d521c50d4822ac8ecec5cbca1fc6d837c95136a6ec1da8346b324e87c1a059c0a91ac09c09ead8583b147208ea3b3bead12ffba68fec3b6840e21b09379212ddace6a1f13827166004015089a4317ea19dfd97f8a740307ea035bbaf04e6a1275a8bf50a7710281db2c17054b6a33ba30113dc2c272c8dad0093ec23839195e09e1696f115140772ac81000815b8e26c6671ef568f4c61118ad8af166c10839f823eb65ab270c4c07debfce41daae4d8d10cc05041dd58a698c2ba004309fb29c871e1601ef0ec94b96349ea2522667b02506c2c892812421bd2f5445551bc8023c8e8147715a02186cc4bedb1dec86d3cfab1b961ad7f5ca0a4e618e524f3331524152c7d84de4880684e71994728fea88afe3fa2ffaf88bb48b4e90b6db2a63bf993dbcf2d019d46b66d7c41c67c152e49bf3d725f701081fad801d927d2e45a825a49366b2bbf125de7716238e62725762b9c3b9bd85dc76081ae7fc799d62aaf4f3036bb3b65e1fc7a34d6837a7c1745259f21cdbbabc47125dfced58a590007d1b66f387add68681fe04426c82c50365887e2b60c77bb87bdb16749928bcaa2d42aa1b31b121db64a9f6ca26d8762f24ec379502abc2172d242cbe7fdad555d35ee4febe0666913c05851fa269724035734500927cce7835615e1a1d3316cc743010dbfcfe5c41b8d76cddd23ebb720187df50212bfea1330c5c5c25ab8cb2eee297878d5b1dfbcb1b25c962279d5c403cb794313287a27ed0fc4b0cd527e0c24e73fe5504478e431eea78ccd10a2e1d6c516868fe1069db3278b49b54ee1172ecb623a0d5d1554917a05365d74d72104bae8fea5bb7bf3effc864c8cbc49eb8373bfe829a622932ba17457ff632760553c4edff0a7982f833cd430432497d8e12f8afa26f7bf367a101a09c05b88fcad60a3aba1bac08372567356037512f22890aff91711790c1061e2e5eb3089629b7c6ad131bb47d9654f860ecac81358fcc6d3a26edc7d92c788e5078afec131895c1add99e0f9553744eae6dac5adbaf56d48587cd44ee88b6bcec40e39a35c1ed34e6fd059be7331fa87507da62a6d7acaeebac290aae7f84e70aa9b2bc48c7e2f06d01f6d7399bdf4bb57c0eaeab72421bc65d8cd8cc31112312b2ccfa2ea39ad0f52286c166d29873f640cf0d98bf54edbb6a816ad528b650653b6f14992d18f79e196ad01fc6c779ff86a7398ed4e813ec6462623ca648843af4a3547482a26736f70e5efd77c370e27fd3a5dba3b256a4f7c365d05abc5025146716d5615548efa0aa8f297385437eded1adee246e4cbce6bb418a8f5d48f597e29eb3d8e642c8756df72faba8f297cbc16dfd893d138a53713b8c10e3cd2008be10e39f71e948f4d324ea272955e6f608b0692e8f99594bb014919367b6ab3132bfb0542d82354cf375b0b99f3b56150d9db7886c0866981ed1009129e9cf5d8e0987931f41b1876e4027d29c4356d57f089fa7bce1be637898134f20eefe2eee4ee42eb752be432bf50e2d9f3b4045d9997e6ec466cdf37ec87a4e4f6656350c310f108ea50ee769229dd185127600c822037bb49084e927669b3aec80dc17240379cb9c7c552eec04d10da29381001c9416c2f6a0bc4b3e9c921c524c3db37a01b348051acf93083d4112c370eb89f", 0x1000}, {&(0x7f00000011c0)="22788e9b5720fc84123d8a9561c53ce39c2ee27189e6a707a47c211b16c8156eb14e4c562e79729d9c2fe728e0e4773515e1b0284ccf433cfde36d152422b9ef688118ba870c69c8b38d9e1ecbe987b4f28ba4364f7b85bb70a9d26e28261e2496f1d13b6549446b6c7cd9a192d93b76f4f091b825c9c7765899ac67bdeb38943f059689f5f377c9060fcbc06c1822125795acb4c730deb879ddf5", 0x9b}, {&(0x7f0000001280)="9ee4af33cda7b880a8dc4ea8b8c23d00f5b6b93bb63d39f65fb99e6b46e2097b318bbcf6a5137e217a212c88fbc28bd00f9f67c21a28bc061027a76a20cdac5cf75cbd752d9d1f7b845f230b5564e0a3b47a193ebc3330c956f3a80488d0cc102c11825c08540fddd66076338bc4a9e8ba5b2b9b592548591c69fbb136f509fab28a65dbf42897adb10b90e82b6c515d10409424bdbd3b1d50efd4", 0x9b}, {&(0x7f0000001340)="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", 0x1000}, {&(0x7f0000002340)="84ac01de93d01421d616f0c8c0c8d01b37ec0912ddaf1a5b8cebcb93037f54f8bbcde91a42ec62d74bf61337bb258c5e71800609b35f4d6fbe62e958b7e4a6ab1489674cdd5a2aea4a1b22d68c6775a1ca1b4237eed78699b9e9adffdb6798c14134", 0x62}, {&(0x7f00000023c0)="faed9411227e1b804236d278d5b6958fd22d36db4ecb19f34fb9e3ef93c56cc43d7544fb125041e1e9f8a865e07483e5d19825c5595a9cc2a94edcc3cecaa4f05aadc9847769cbffa05ddc5c7257a4d6209d773418b64e44ec2ba22f3b6d52967bc1f034e998098f53a7322518bce67fbeecae1f3877dff715ea7480279e5b12fbc9195ea9eca7cda2cda18442c2011d52a336ece2a9caf72280ceee8396ce0ea8a63fe499ebc6ca06443dc7fe0ef60552c0091e0097a607f25f8af9b09cab55fd04b09c8c19677ec548cd0a4d86f4f6f08ec9411691c0ddace1ce804b59f48ff8df6caee577a793f007ca7893fe32077270dc89035ce5a374", 0xf9}], 0x6, &(0x7f0000002540)=[@assoc={0x18, 0x117, 0x4, 0x8}, @iv={0x48, 0x117, 0x2, 0x32, "26c8ca23e4867a32db670b99f1ca5a3df84323d74bbfc414bdf3ac1c60c4a39573e53bb793b6da762e2da3750b7a7ae63f2e"}], 0x60, 0x10}, {0x0, 0x0, &(0x7f0000002600)=[{&(0x7f0000000140)="ba660712e234c78a4fec695f", 0xc}, {&(0x7f00000025c0)}], 0x2}, {0x0, 0x0, &(0x7f0000002700)=[{&(0x7f0000002640)="19a4b035967cc8194003e8cde898424e49a77572bf1d26e17ac0417452e9309557a9cc0c31db119cb2929d1372b17e558fe56bff0f5994f07df54151bf3f84a4857f09251d6c9b2f63cd91fc7ccf", 0x4e}, {&(0x7f00000026c0)="d04348c32a10ebaf8d311471c699795a59833ac5ffd20f53d52fd1dca12113caa995ef2ee1b976430e299f", 0x2b}], 0x2, &(0x7f0000002740)=[@iv={0x70, 0x117, 0x2, 0x59, "996c621f402d612d5d4c80557916078c289bba3e59fc580ba25e020a7b87ca1581528b777a7192021b9346f379cb1dae748f785497e79c15218c4cb2feb9cc4a77dd41481cf6aaf8fcc915515030ff4863aa31441bc7a60b69"}, @iv={0x20, 0x117, 0x2, 0x6, "7fcb9d1f5e3e"}, @assoc={0x18, 0x117, 0x4, 0xe91a}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @iv={0xd8, 0x117, 0x2, 0xc0, "2491a63c6c62ce5cdb83ae6c325ea912311ea936645b429961596153e292a5b8368570643a727741a2747211509482832bc3d8cb0b1a18383447c2de2338e1d8a30bd537a94fa426dce68290c34006846b0831958691cc17fbe678ff9763812a4e21495b5ea209ae01b55fddbbb98f12c1ddf01519000bdf930970558015883fd842fd1ee64e3808263af1a5e1414ab3d1943863ff440e2a0cf6893ed4280a00b2e1429bf54252d05abe1a89857077e4c325b2478b20d30f0efe8928f1423c9a"}], 0x1b0}, {0x0, 0x0, &(0x7f0000002c40)=[{&(0x7f0000002900)="9344e78fce10ed9b86c50a2ce2110dab2a322a7d9d0f579eebd57e687e265f8d2728b75d6310827c6d7c7fc8f3eeba3042e5f32ed7db732c52b4d4f194acea4a3dfe5d7c729b8a6f8b7ecf9f8090391a1c9f976b5fde7a09d7d4b31d1c9f13d54f3bd090808507b132b06baf93d47a3bd09ea8a71e0bfb89950df7a0555b06829709ae3462e96fde6dbdf81c85c2f3545b73", 0x92}, {&(0x7f00000029c0)="0344ee5253a173e4cf38428abb049ee01224c29ea10a79f0b64bd5ba329170796e4c2d25338f6f6aa8e576dea3630445fe0aca90978182c26bce412e44a68dd5450fdcaf4d637bec2a145172cf209a2984b53c1424a8db15509bd50a1fbded99d946a7b59fc7d45a55c968ff3ce0429e345165398fccd04431bfd1fff66328bc2f3e4be7071b8443ea9d3546e5718479f51bf9fdeddffaf0483ce0e0b29f31cff5139e10b370f89410", 0xa9}, {&(0x7f0000002a80)="ba398a1574f095b89f66d2aa60f662277e4679731d938638a1d01fcf7fd89dc44de4b33305eae4d95bda33e8b9bf71141a9fae0c8a83a7a7f74774c64fd5f7a229b61e131a9de92a60d9d968bb118bac38143e25e1aa947013fa657e531eced80adf94a95216750dfb8a05cf26699a9ceb0ee63086ca5b480e0644eb67f7ee4a2d44e205fbf177f0fdff9a8a83e119bea081873d27d6add566ce2bd16791aa27b0d469cddbc97be5e0e3e90db9421038ebceb8fdabae045d5d7f077e1efe9c", 0xbf}, {&(0x7f0000002b40)="79a629eb0784a6b4e0d466345c726f916057277429a837adb31f7c39e50bf09b456907e20fdf206b1bc85114a92bd02345ac84f5cddb3f89d53c4218979efa3c25a147dad6c4c3fafb19671faa2c48e32acd520e0a67e1783238e3f289a60e0e158a60b81a4c43cdb330dd2b03cfefca81c38aa4d5b957c359594846e69acb7802bf8f07f02326bf3a62807f18dc96588df98746f09dfe516d8653054e890ab586daaf5135133fb37af5b86e3a6e6f753f73235bee49c118a6a4e2fbb9d56c7c8e6c3838fd0cb4be9a1965a3c88cf2d462ed00848685e89e55f5910579236cd4e470ac05446bce8354eec5bced1e8afa7e6d11ca1bce8654c7b946fccc", 0xfd}], 0x4, 0x0, 0x0, 0x8000}, {0x0, 0x0, &(0x7f0000002f00)=[{&(0x7f0000002c80)="70becaf4b9cf1cda76e7f256103b13151f89badc13ffd573d75e62f104c12ab9701eedbe682ab27d718a79e3925d439c5745dda387794c6a4cc962c00af1841b9e25d71722b65ce7d6fee8ee8f768b975551e2d01ee60d8b825f1eb8489934b2bc63f7b4f17f0a37cb44c9ac9f2167c7119dce1372e840734477de84a1c39951b4a1962826993afc48f8d22d18a4931f534afeae3fd216216e02e91cff8f03d1fcce7db52dcdd08428a46e3689d7e35f83facd5533885222a9455e08344924f4015f63530fd3751b8819efdfdff4532885e9ee5c45f243", 0xd7}, {&(0x7f0000002d80)="8be9afe75ec20711071cb2b138abfac51b417658653301a80c9494f7fe1fa4d08386d717598c23ed22e098b8da23ba35957db65cacadc2d7b5b83ee613ffdf72d96a470e3bae9fa26ad39bb3815cb0fe350fc76b90558bd7b098e618fe1b4b4d54f4c873402da91188eddb72480468f778661e68708b9abd2374a38cb4", 0x7d}, {&(0x7f0000002e00)="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", 0xff}], 0x3, &(0x7f0000002f40)=[@assoc={0x18, 0x117, 0x4, 0x5}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}], 0x48, 0x805}, {0x0, 0x0, &(0x7f0000003300)=[{&(0x7f0000002fc0)='N', 0x1}, {&(0x7f0000003000)="d8098b39b706c0f7050772608ddb1ab6ba36cf5be4c86d0639f18bad58508289779ce3fdec94650fdce42209ac5e867e62207d73f3e01a8b898fe81338a00d78588db894c4990094b3866773a72ad835fcaae994b6345e7397b96696974bc4b88af75bdec11ee371cce228d79470ac453984962607d889b4a7d950fdb8d3f48bc30a8a7e359ac511442476419062f3dfa02838158edaf6104ad055", 0x9b}, {&(0x7f00000030c0)="f1d061baf48c325f9459f8af2b20bd817fd24d87dd93a02fb585c1708942a2f377caa6474df2b4a1ac4d5a952fb3822ae99e7ad1e0c9f08c50e42796b58fb74e0ce3ee881cdbebf509d0a60c933ab62c65091b23b93501b8ff1df0c356bf469c96eb9d076636ebee5ffa334cc075b14d015463449ae1c48fb759dd1d058eacda2f0f", 0x82}, {&(0x7f0000003180)="fc05f5505be1ac3a8f1650c9e8a8df0d6f97a9b8dab26898f897ac4776f2984be9dfaf6659ce170756f5e27356d9d8d5a066fd36dd5595a2b7147a52b1c1bc376c2519e6d6b2dac5ecb660b86f186c45ca6cb8d81138eeb88876244355371423265ec24233902f9090eb79e4e80fa512c088155bcc6d80", 0x77}, {&(0x7f0000003200)="19bf7c616dcdcfa5efffc7356c23290c4b6c2592edc772da7b05dd47d3fba4fad5a260d5533b6a1ea698bcbe9dba5a4c11b7f3515480193a0fb803f317fcee392c403af331ddc1f1aaa298e72b04f322", 0x50}, {&(0x7f0000003280)="b387b81c0cf0dee586ab41fccaa99af892863f00fb29337d63217eccab2693f6dacdb4f7da1c9643f13bd425430e517acff9327e24152256104e31831709f2a0d3cff580e2f503a514f9a8315fa1b590f5301eeeb8fc5b951e72cfc2b5180241a179e496de0647ff98e7185621397e4c5f64118ca727f43ce4c8f630922f", 0x7e}], 0x6, &(0x7f0000003380)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x7}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x6}, @iv={0x70, 0x117, 0x2, 0x5b, "f765e6fca3a575b4881707794ecbc37942c831f9f23d76c839d65989aa0e53d4f4a987294fbb264b028303046397819c03ba74d004f61dedcc8990beedd2c070ab8f15a61adbe46c794342a85b40960e9a732e419c7afddcd3b6b4"}], 0xd0, 0x4040000}], 0x6, 0x4008040) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) clock_gettime(0x0, &(0x7f0000003600)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f0000003700)={&(0x7f00000025c0)={0x1d, r2}, 0x10, &(0x7f00000036c0)={&(0x7f0000003640)={0x5, 0x400, 0x3, {}, {r3, r4/1000+10000}, {0x1, 0x9, 0x1000, 0x200}, 0x1, @canfd={{0x1, 0x7fffffff, 0x2, 0x100000001}, 0x27, 0x2, 0x0, 0x0, "b8194b597531155f4b03a04908afd0843e007a4c585dc9a4238de190f946d61b5e80d25aea57a20ac23eb03a608c1d1186ed01cc02cd9d6e0621920f1a6b00db"}}, 0x80}, 0x1, 0x0, 0x0, 0x20000000}, 0x881) 20:04:44 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xb7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) [ 2931.764572] XFS (loop2): SB sanity check failed [ 2931.777795] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 20:04:45 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0xffffffff00000000}], 0x0, 0x0) 20:04:45 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="78667303", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) [ 2931.829957] XFS (loop2): Unmount and run xfs_repair [ 2931.836024] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2931.864522] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ 20:04:45 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) r2 = semget(0x2, 0x0, 0x120) semctl$GETZCNT(r2, 0x1, 0xf, &(0x7f0000000040)=""/8) [ 2931.879516] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2931.902495] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2931.912236] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ 20:04:45 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000080)={0x0, 0xfb, 0xa0, 0x3, 0x6, "2309677a170bb2e3a7f8d482fa728de7", "92e5dcecd68a766aaea5bc0e5077b48d092c6054958f2f19b692d3db867237f44a6efbe258ec3c900f5c0315c6affe25bc23b598ac36a0298f019f62bb121c1d733070d31f00d89613871a1ad6ca616f07b7c750f05b658aa6e365718c2eab0dc381179f151521a780eff0c0eb96848d420a7e5af3b2f409730f2f20b7dff01670d96c784e186f938a8b9a"}, 0xa0, 0x1) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) [ 2931.935690] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 20:04:45 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2931.998324] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 20:04:45 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x8008}], 0x0, 0x0) 20:04:45 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x400000802, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f00000001c0)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) getpid() getpgrp(r4) fcntl$getown(r1, 0x9) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000280)=0xc) r6 = getpgrp(r5) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)=0x0) kcmp(r6, r7, 0x5, r0, r2) [ 2932.065384] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2932.089360] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2932.098083] XFS (loop2): SB validate failed with error -117. 20:04:45 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:45 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:45 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$FICLONE(r0, 0x40049409, r0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) 20:04:45 executing program 4: r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) connect$llc(r0, &(0x7f0000000040)={0x1a, 0x310, 0x1000, 0x9, 0xc8b5, 0x3efa}, 0x10) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000080)={0x1e33}, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r1, 0x5452, &(0x7f0000000000)={0x2}) 20:04:45 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x5}], 0x0, 0x0) 20:04:45 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:45 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0xfcfdffff00000000}], 0x0, 0x0) 20:04:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x5452, &(0x7f0000000000)={0x2}) 20:04:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x80, 0x2600) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) 20:04:45 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x4000000000000000}], 0x0, 0x0) 20:04:45 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2932.449950] XFS (loop3): SB sanity check failed [ 2932.456258] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2932.505957] XFS (loop3): Unmount and run xfs_repair 20:04:45 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f00000001c0)=0xc) process_vm_readv(r0, &(0x7f0000001340)=[{&(0x7f0000000200)=""/108, 0x6c}, {&(0x7f0000000280)=""/143, 0x8f}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x3, &(0x7f0000001400)=[{&(0x7f0000001380)=""/5, 0x5}, {&(0x7f00000013c0)=""/28, 0x1c}], 0x2, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_smack_entry(r2, &(0x7f0000000040)='security.SMACK64IPOUT\x00', &(0x7f0000000080)='/dev/rtc\x00', 0x9, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000000c0)) ioctl$RTC_WKALM_SET(r1, 0x5452, &(0x7f0000000000)={0x2}) [ 2932.529868] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2932.554200] XFS (loop2): SB sanity check failed [ 2932.559094] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2932.574161] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2932.582818] XFS (loop2): Unmount and run xfs_repair [ 2932.596841] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2932.608003] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2932.616616] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2932.625292] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2932.625417] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2932.653710] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2932.662080] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2932.670754] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2932.679333] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2932.688004] XFS (loop3): SB validate failed with error -117. [ 2932.694805] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2932.703516] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2932.713220] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2932.721589] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2932.730196] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2932.738695] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2932.747022] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2932.755559] XFS (loop2): SB validate failed with error -117. 20:04:46 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:46 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000080)={0x0, r0}) r2 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r2, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) 20:04:46 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x3}], 0x0, 0x0) 20:04:46 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:46 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) 20:04:46 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:46 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, &(0x7f00000001c0)=""/204, 0xcc, 0xf06ec69c62156d7b, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f00000000c0)={0x5, 0x100000000}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) 20:04:46 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x8800000}], 0x0, 0x0) 20:04:46 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000040)={0x0, 0x80000, 0xffffffffffffff9c}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f0000000240)={{0x7fff, 0x40}, 'port1\x00', 0x10, 0x1000, 0x10001, 0x0, 0xd58f, 0x3, 0x1, 0x0, 0x6, 0xae}) ioctl$BINDER_THREAD_EXIT(r2, 0x40046208, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r1, 0x40206417, &(0x7f0000000080)={0xe05, 0x0, 0x9, 0x2, 0x1}) 20:04:46 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e23, 0x1, @mcast1}, {0xa, 0x4e22, 0x100000000000, @dev={0xfe, 0x80, [], 0x1d}, 0x80}, 0x2, [0x6, 0xffffffffffff79b0, 0x3ff, 0x9, 0x800, 0x0, 0x1, 0x9]}, 0x5c) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002fc0)={{{@in6, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000030c0)=0xe8) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000140)={0x0, 0x0, {0x2, 0x1e, 0x13, 0x5, 0x4, 0xbd4e, 0x0, 0x5c, 0x1}}) recvfrom$packet(r0, &(0x7f0000000040)=""/6, 0x6, 0x100, &(0x7f0000003100)={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @local}, 0x14) [ 2933.152040] XFS (loop3): SB sanity check failed [ 2933.160394] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 20:04:46 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x5000000}], 0x0, 0x0) [ 2933.192511] XFS (loop3): Unmount and run xfs_repair [ 2933.202792] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2933.205902] XFS (loop2): SB sanity check failed [ 2933.233233] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2933.238166] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2933.271845] XFS (loop2): Unmount and run xfs_repair [ 2933.274316] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2933.277489] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2933.297285] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2933.302710] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2933.321349] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2933.326153] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2933.339924] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2933.348669] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2933.357310] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2933.358189] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2933.365969] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2933.382593] XFS (loop3): SB validate failed with error -117. [ 2933.394267] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2933.402632] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2933.410862] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2933.419104] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2933.427277] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2933.435710] XFS (loop2): SB validate failed with error -117. [ 2933.568867] XFS (loop2): SB sanity check failed [ 2933.574139] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2933.586332] XFS (loop2): Unmount and run xfs_repair [ 2933.591447] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2933.598447] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2933.606825] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2933.615098] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2933.623293] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2933.631430] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2933.639752] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2933.647928] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2933.656105] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2933.664287] XFS (loop2): SB validate failed with error -117. 20:04:46 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="78667301", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:46 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) 20:04:46 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x10}], 0x0, 0x0) 20:04:46 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:46 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xdb, 0x0) syncfs(r0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) 20:04:46 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:46 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x7e, 0x8f, &(0x7f0000000040)="dd8dc5eec0845297405d3c0db24b0e71a5d5a75e310ef36e289cdedc0a6764bda2084d9fd9d63340fccb96d99429c1da4666b7eae05bf35b352a1bed32e9d8bdf06a0cb1a1b625e68a40aedbdcfd3eceb60faec520afda7e0651495f57e0eca56a87670e17865c13af2d14c252b3408495cffaa58a3cb087e38ee82774fd", &(0x7f00000001c0)=""/143, 0x8}, 0x28) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) 20:04:46 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x8000a0}], 0x0, 0x0) 20:04:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x400000) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000080), 0x2) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) 20:04:47 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x3f00}], 0x0, 0x0) 20:04:47 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) ioctl$VIDIOC_G_AUDIO(r0, 0x80345621, &(0x7f0000000040)) [ 2933.917230] XFS (loop3): SB sanity check failed [ 2933.926590] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2933.951898] XFS (loop3): Unmount and run xfs_repair 20:04:47 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfsh', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) [ 2933.963530] XFS (loop3): First 128 bytes of corrupted metadata buffer: 20:04:47 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e7, 0x0, 0x8, 0x10, 0x0, 0x0, 0x0, 0x8, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x20000, 0x6, 0x0, 0x0, 0x100000000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x0, 0x200000) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f0000000140)={0x3, 0x4, 0x20}) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f0000000180)={0x7d, 0x0, [0x40, 0x0, 0xffffffffffff8001, 0x7fff]}) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0xd0003, 0x0) [ 2933.994188] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2934.008377] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ 20:04:47 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0xf6ffffff00000000}], 0x0, 0x0) 20:04:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdffffff00000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2934.057758] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2934.088201] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ 20:04:47 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x238400, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000340)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r1, 0x5452, &(0x7f0000000000)={0x2}) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f00000002c0)={0x2, 0x0, [{0xd000, 0xd7, &(0x7f00000001c0)=""/215}, {0x0, 0x77, &(0x7f0000000040)=""/119}]}) [ 2934.138893] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2934.175988] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2934.210253] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2934.225181] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2934.237624] XFS (loop3): SB validate failed with error -117. 20:04:47 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000380)={0x800100f, 0x401, 0x3}) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000080)=@alg, 0x80, &(0x7f0000000100)=[{&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f0000000000)=""/23, 0x17}], 0x2, &(0x7f0000000140)=""/59, 0x3b}, 0x10002) 20:04:47 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x2000000}], 0x0, 0x0) 20:04:47 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:47 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000040)={0x6, 0x0, 0x10001, 0x80000001}) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f00000000c0)={0xcd, r1, 0x20fffd, 0x7}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000080)={0x18, 0x1, 0x0, {0x6}}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) 20:04:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:47 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="78667303", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:47 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x200, 0x10000) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) 20:04:47 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0xfeffffff}], 0x0, 0x0) 20:04:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x2, 0x98f904}) 20:04:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24bca3fed19]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2934.661611] XFS (loop2): SB sanity check failed [ 2934.667084] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 20:04:47 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) fcntl$setflags(r0, 0x2, 0x1) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x10000002, 0x0, {0xfffffffffffffffc, 0x0, 0xfffffffffffffffd, 0x0, 0x4, 0x0, 0x0, 0x29}}) 20:04:47 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x40000000}], 0x0, 0x0) [ 2934.721007] XFS (loop2): Unmount and run xfs_repair [ 2934.729061] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2934.736464] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ 20:04:48 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0xfffffff6}], 0x0, 0x0) [ 2934.792308] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ 20:04:48 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2934.853962] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2934.893736] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2934.927129] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2934.950463] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2934.972495] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2934.980883] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2934.989442] XFS (loop2): SB validate failed with error -117. 20:04:48 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="78667302", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x7, 0x98f904}) 20:04:48 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfsp', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:48 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x400001, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f0000000140)={0xb, @capture={0x1000, 0x1, {0x7, 0x3f}, 0x81, 0x100000000}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) 20:04:48 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x3f00000000000000}], 0x0, 0x0) 20:04:48 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:48 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x800000000000000}], 0x0, 0x0) 20:04:48 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) 20:04:48 executing program 5: setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@v2={0x7, 0x1, 0x6, 0x1, 0x89, "88b329f8ab5f1b5d966d44df0ad027047f84ea94f676ec4cc2b7bdcfce62eefcfe0a520ceaf8d7a2320291b33a4d1993d24db7db1d4b943e2a1d464ec0fdd169fb1298872b929e9bd97f5482726ae76cd3eb55d0e2bfe6e1833c79c4423561da6209f584c6cbb02855ed8353c93d42922dd76e1c51690f824e3523bce27a6d7008a5dd0e7d0777e80c"}, 0x93, 0x2) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x1c) setsockopt$inet6_dccp_int(r0, 0x21, 0x7, &(0x7f00000002c0)=0x6, 0x4) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) 20:04:48 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:48 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x10000000}], 0x0, 0x0) 20:04:48 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc\x00', 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) 20:04:48 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:48 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="786673c4", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:48 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0xffffffffffff0700, 0x0) 20:04:48 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) 20:04:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='status\x00') ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f0000000080)) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0x8d, 0xbf, &(0x7f00000000c0)="225ca08537359d4d7b9ba2e9d40ff5869b2fc58dc6f0c108c3e741fa5d301e068f2d5efffcbd210f265e73a8aa6319f30a81f1cb15f9e08f0a2dd670a0b4716d618f561149ef9856afbe71236785a009691b04ce9066ab7522342710d2865699fd63787ecee468d129f87e3f6bf059d97e640f8d49850801faab0302e63ad118dc54c922fbfedb7678435812cb", &(0x7f0000000240)=""/191, 0x1f}, 0x28) 20:04:48 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:48 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000040)={{0xa, 0x4e23, 0x8000, @mcast1}, {0xa, 0x4e21, 0x1, @loopback, 0x200}, 0x7, [0x1, 0x948, 0x80000001, 0x9, 0x6, 0xffff, 0xfffffffffffffff9, 0x5]}, 0x5c) 20:04:48 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8008, 0x0) 20:04:48 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x501200, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x81, 0x0, 0x3, 0x3, 0x0, 0x0, 0x10430, 0x4, 0x9, 0x2, 0x800, 0x80, 0x4, 0x70a3, 0x5, 0x3, 0xfffffffffffffffb, 0x9, 0x6, 0x8d, 0x40, 0x3, 0x5fe, 0x5f182b8d, 0x1c1b, 0x5e8, 0x8, 0x1, 0x5, 0x9, 0x1f8000000, 0xff, 0x0, 0x9, 0xcb, 0x9, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000040), 0xc}, 0x1022, 0x3, 0x3, 0x5, 0x6, 0x975, 0xd28}, r1, 0xffffffffffffffff, r0, 0x4) r2 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r2, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) [ 2935.720274] XFS (loop2): SB sanity check failed [ 2935.727141] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2935.776102] XFS (loop2): Unmount and run xfs_repair [ 2935.781264] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2935.788441] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ 20:04:49 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdffffff]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:49 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfsJ', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:49 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8, 0x0) [ 2935.836536] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2935.868441] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2935.876915] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2935.885786] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2935.894352] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2935.915180] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2935.924796] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2935.997023] XFS (loop2): SB validate failed with error -117. 20:04:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x8040) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) 20:04:49 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000040)) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) 20:04:49 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0xfffffdfc, 0x0) 20:04:49 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:49 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:49 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="786673ff", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:49 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000040)={[{0x5, 0x3ff, 0x70c6dd08, 0x2, 0x601a, 0xfffffffffffffbff, 0x3, 0x3f, 0x1000, 0x20, 0x0, 0x8001, 0x698d3e6c}, {0x1ff, 0x1, 0x100, 0x401, 0x4, 0xb2, 0x3, 0x0, 0x2, 0x1, 0x80, 0xff, 0x8000000000000000}, {0xfffffffffffffe01, 0x9, 0x400, 0xa000000, 0x9, 0x54a, 0x1, 0x200, 0x4, 0x1, 0x1, 0x5, 0x2}]}) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) 20:04:49 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x100000000000000, 0x0) 20:04:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x40000) 20:04:49 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x100800000000, 0x0) 20:04:49 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0x40030000000000}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:49 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x420200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x4) 20:04:49 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) [ 2936.451826] XFS (loop2): SB sanity check failed 20:04:49 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000000, 0x0) [ 2936.477281] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2936.490566] XFS (loop2): Unmount and run xfs_repair [ 2936.497318] XFS (loop2): First 128 bytes of corrupted metadata buffer: 20:04:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x44, 0x40) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) [ 2936.532194] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2936.547230] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2936.577544] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2936.620452] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2936.645333] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2936.683993] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2936.700681] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2936.716222] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2936.726138] XFS (loop2): SB validate failed with error -117. [ 2936.759804] XFS (loop3): SB sanity check failed [ 2936.766737] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2936.778645] XFS (loop3): Unmount and run xfs_repair [ 2936.783731] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2936.783748] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2936.783762] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2936.783777] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2936.783790] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2936.783802] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2936.783813] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2936.783824] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2936.783835] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2936.783861] XFS (loop3): SB validate failed with error -117. [ 2936.894927] XFS (loop2): SB sanity check failed [ 2936.899689] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2936.910899] XFS (loop2): Unmount and run xfs_repair [ 2936.916393] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2936.923330] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2936.931473] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2936.939667] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2936.947854] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2936.956028] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2936.964208] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2936.972381] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2936.980521] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:04:50 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="7866731e", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:50 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x40000000, 0x0) 20:04:50 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0xfdfefffffffffffc, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) r2 = syz_open_dev$media(&(0x7f0000000340)='/dev/media#\x00', 0xff, 0x2400) r3 = syz_genetlink_get_family_id$nbd(&(0x7f00000003c0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x38, r3, 0x26, 0x70bd25, 0x25dfdbfb, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x401}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x10000}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}]}, 0x38}}, 0x80) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f00000000c0)={0x2, 0x4e21, @multicast2}, 0x10) 20:04:50 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0x8000000}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) [ 2936.989973] XFS (loop2): SB validate failed with error -117. 20:04:50 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x10, 0x0) 20:04:50 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="78667304", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:50 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) getsockname$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000300)={r2, @multicast2, @remote}, 0xc) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000080)={'veth0\x00', {0x2, 0x4e22, @remote}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f00000001c0)={{0x10000, 0x4}, {0x1ff, 0x644d9247}, 0x200, 0x4, 0x8}) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x4800, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000040)={0x80, 0xbb, 0x1, 0x0, 0x0, [{r1, 0x0, 0x80000001}]}) 20:04:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x40000000000003, 0x98f904}) 20:04:50 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0x10}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:50 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x2, 0x0) 20:04:50 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="78667310", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:50 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) write$P9_RMKDIR(r0, &(0x7f0000000040)={0x14, 0x49, 0x1, {0x81, 0x1, 0x4}}, 0x14) 20:04:50 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000080)={0xb, @sdr={0x30314247, 0x7fff}}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) 20:04:50 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0xfdffffff00000000}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:50 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x4000000000000000, 0x0) 20:04:50 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0x2000000}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:50 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0xf6ffffff00000000, 0x0) [ 2937.489383] Unknown ioctl -1060088315 [ 2937.509539] Unknown ioctl -1060088315 20:04:50 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:50 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000000c000/0x18000)=nil, &(0x7f0000000180)=[@text64={0x40, &(0x7f0000000240)="0fea02b805000000b9000000000f01d9460f35b9a90800000f32670f07440f009c226f9600003e260f01df66baf80cb8d2e9b388ef66bafc0c66ed410f3248b8feffffffff7f00000f23d80f21f835800000b00f23f8", 0x56}], 0x1, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@local, @in6=@mcast1}}, {{@in=@local}}}, &(0x7f0000000100)=0x237) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) 20:04:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x2041, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000100)={r2, 0x2}, 0x3) r3 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000240)={0x7, 0x70, 0x6, 0x7f, 0x80000001, 0xf20, 0x0, 0x8, 0xd80, 0x3, 0x7f, 0xa39e, 0x2, 0x6, 0x7ff, 0x9e, 0x6, 0x3f, 0x3, 0x8, 0x0, 0x2, 0x0, 0xdb3, 0x1, 0x40, 0x79e, 0x80000000, 0x0, 0xff80000000, 0x400, 0x40, 0x10001, 0x4, 0x80000001, 0x7ff, 0x101, 0x9ef4, 0x0, 0x4, 0x0, @perf_config_ext={0xaf, 0x20}, 0x44, 0x0, 0x1, 0x0, 0x7fff, 0x6, 0x100}, r3, 0x0, r1, 0x8) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) 20:04:50 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x1000000000000000, 0x0) 20:04:50 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0xa0008000, 0x0) 20:04:51 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:51 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0x10000000}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:51 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x4000000, 0x0) 20:04:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x40, 0x2) ioctl$DRM_IOCTL_CONTROL(r1, 0x40086414, &(0x7f0000000080)={0x0, 0x1}) 20:04:51 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x10000400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) [ 2938.010214] XFS (loop3): SB sanity check failed 20:04:51 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000100)={'filter\x00', 0x4}, 0x68) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@v1={0x2, "61fa37b6953f44ab303edff508bf"}, 0xf, 0x3) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) 20:04:51 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x5, 0x0) [ 2938.041141] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2938.062481] XFS (loop3): Unmount and run xfs_repair [ 2938.095582] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2938.125588] XFS (loop2): SB sanity check failed [ 2938.140201] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2938.162225] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2938.181479] XFS (loop2): Unmount and run xfs_repair [ 2938.192405] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2938.193454] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2938.212304] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2938.221640] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2938.230118] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2938.230349] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2938.239178] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2938.246958] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2938.255313] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2938.263943] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2938.271519] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2938.280003] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2938.287962] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2938.297050] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2938.304437] XFS (loop3): SB validate failed with error -117. [ 2938.313145] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2938.326807] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2938.335175] XFS (loop2): SB validate failed with error -117. [ 2938.406387] XFS (loop3): SB sanity check failed [ 2938.411713] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2938.423952] XFS (loop3): Unmount and run xfs_repair [ 2938.429318] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2938.437869] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2938.451920] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2938.461343] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2938.470829] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2938.479183] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2938.487915] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2938.496266] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2938.504447] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2938.512647] XFS (loop3): SB validate failed with error -117. 20:04:51 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:51 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0x24bca3fed19}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:51 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr(r0, &(0x7f0000000140)=@known='trusted.overlay.redirect\x00', &(0x7f00000001c0)='/dev/rtc\x00', 0x9, 0x1) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) ioctl$VT_WAITACTIVE(r0, 0x5607) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000080)={0xffff, [0x8, 0x75f, 0x401, 0x1, 0x0, 0x4, 0x1, 0x6, 0x7f, 0x80000001, 0xffffffffffff7fff, 0x4, 0x7ff, 0x3, 0x400000000000, 0x40, 0x7a77, 0x4, 0x0, 0x3, 0x401, 0x0, 0x8, 0x1, 0x10000, 0x1, 0x2, 0x7, 0x378, 0x4, 0x8, 0x20, 0x8000, 0x0, 0x7f, 0x400, 0x400, 0x80000000, 0xfffffffffffffffc, 0x8001, 0x2, 0xd2, 0x400000000000000, 0x4, 0x6, 0x80, 0x1f, 0x1], 0x9}) getsockname$netlink(r0, &(0x7f0000000200), &(0x7f0000000240)=0xc) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000040), 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={0x0, r0, 0x8, 0x3}, 0x14) 20:04:51 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000040)={0x3, 0x10000, 0x1}) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f0000000080)={0x2, 0x2, 0x100000000, 0x0, 0x6, 0x0, 0x3, 0xffff, 0x2, 0x8, 0x7f, 0xfff, 0x0, 0x1, 0x0, 0x1, 0x9, 0x4, 0x1}) 20:04:51 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8100000, 0x0) 20:04:51 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="786673ff", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:51 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000040)={0x1ff, 0x2, 0x7, 0xbf, 0x951, 0x7}) 20:04:51 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0xfeffffff00000000, 0x0) 20:04:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x80, 0x111205) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000000)={0x2, 0x4}) 20:04:51 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0x400000000000000}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:51 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x400000000000000, 0x0) 20:04:51 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) [ 2938.988371] XFS (loop2): SB sanity check failed [ 2938.993575] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2938.994665] XFS (loop3): SB sanity check failed [ 2939.005151] XFS (loop2): Unmount and run xfs_repair [ 2939.014907] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2939.021661] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2939.022673] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2939.029992] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2939.050039] XFS (loop3): Unmount and run xfs_repair [ 2939.055167] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2939.055184] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2939.064948] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2939.078747] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2939.080375] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2939.087361] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2939.098159] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2939.104019] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2939.111786] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2939.111803] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2939.121534] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2939.128396] XFS (loop2): SB validate failed with error -117. [ 2939.136898] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2939.158889] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2939.167190] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2939.175548] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2939.183773] XFS (loop3): SB validate failed with error -117. 20:04:52 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:52 executing program 4: socketpair$unix(0x1, 0x1000b, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x406, r1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x400000, 0x0) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x10000, 0x10000) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x4001ff) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x5452, &(0x7f0000000000)={0x2}) getsockopt$inet_mreq(r3, 0x0, 0x24, 0xfffffffffffffffe, &(0x7f0000000140)) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891b, &(0x7f0000000100)={'ipddp0\x00', {0x2, 0x4e22, @broadcast}}) setsockopt$inet_tcp_int(r2, 0x6, 0x1f, &(0x7f0000000180)=0x6, 0x4) 20:04:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)=0x0) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f00000000c0)=r2) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 20:04:52 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0xffffffff00000000, 0x0) 20:04:52 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0x1000000000000000}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:52 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:52 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0xfcfdffff, 0x0) 20:04:52 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000040)={0x1, 0x0, {0x100000000000}}) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f00000002c0)={@local, @local, 0x0}, &(0x7f0000000300)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @empty}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@loopback}}, &(0x7f0000000440)=0xe8) fcntl$getownex(r1, 0x10, &(0x7f00000009c0)={0x0, 0x0}) r9 = getegid() r10 = gettid() lstat(&(0x7f0000001080)='./file0\x00', &(0x7f00000010c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = fcntl$getown(r3, 0x9) r13 = getegid() r14 = gettid() getgroups(0x2, &(0x7f0000001140)=[0x0, 0xee00]) sendmsg$unix(r0, &(0x7f0000001280)={&(0x7f0000000140)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000001000)=[{&(0x7f00000001c0)="485608122196118ca0f03fca3180228ba1551b71bb4b856fc650ca2bc3ea4e77283b257382106b95931d672bee1da53552bc1c610082c7c6a3e4b4b56ff73b622c50a79ea080e835595009b013d7d74b19349c070e83ac140a2a4fffd32d43c2752aa21e5d34ab209ed7d08e3afbec9eb9136904d33c99c72ac669dc4e22d4cb56005d8e60ba262c4a0b24c994f85b7a49e3be73398dd4c624ec97c570c75ff998ae31579a2e66059b8613e4feae0ab09e08eb5f3403670d7d035aad79d5e1b890d92c", 0xc3}, {&(0x7f0000000640)="5aff38bb85e3431777e91dc0fb64a0b950815646f12995c8faeb70f139bff47181dbfaa1d984b4eea7d9d8f45a2f879dd4e43350e9323a8d7a547e02e89a08c0707dfaf812b899c031d7118f14f78e467024ae4e2154c12021c7fe97a7e6a8579adf85c2aadf7371e09157bf6da143583c5b4fa2d2ab148c41b0468064707f10ae0bfc1bb0a9d6573d05baddaba615631fd74137cf3ceb95e9ad461f96b64227ecccd653932d04ed1979803e54faa0f2d68c25dd068c37b9a494126814f81af27aecd50d5d05bd176e17", 0xca}, {&(0x7f0000000740)="1a4dedf0bf0021da8f0692b5626a4489299d215a48661b1c7eb2b6978605a904d01ce521402d06aa08655e78b1e286fabe6e84a9438a894620662cfe62206f6f08ef3da3b0baf4908aee4272b75173a0d690bb3adcdd548963682414743026b7e96e021f9f1dbb89a350b6730d3496e5d0052dafd42b78555d795df1cf3c294c9fa2b7641948ca374f08fee62a1b69f72afd8085393df80e1c8d645afdceb4277af3c7becd267aa8c1735743a79350b27b5a4c", 0xb3}, {&(0x7f0000000800)="14dc829c27b559a1cb4adf70d432720cc6c1fe550f1b865bc2efcc3d26f0bfc8810100bd0e208a0261905202c896b21da07f5717536542b4a5b1d60b0b8869aa8c08f4a9ddeef6502fc9147be1b91dd18ac3ccfcf9799b67258a539a36224a0f09d2ee66dedece97064c98ad4a366573b61bf0acf6790db0a8c76105c706bf17fe95e50452fc32c44b8bcefa084cd409f36594423bf75563", 0x98}, {&(0x7f00000008c0)="c31569eebbdfbd25824abdbc9b10e6da6465815ec8751afa2bc81eac22627e5118d508ba26309f87515a67111520f61ad46d3b2dd88525ce335b1582a8693ab06afcb69dd5cdae7a667fe704ea17cd98e34d02db802e21a3e4884fcbef07741bec75a2b96effff5caf1a311c9ced7f39192f304d3e8246160f177b335c896552a0e0512d6a1e7f5bbe86e72d156fba7e13ae4a9e0de9d5c221dfd51e22a94739a99ca71c74c77ff2c8f7e4bd022247f42e4866d70b7c381d81eb8e3477b4a0482529ecb538823399243aff337913cc", 0xcf}, {&(0x7f0000000e80)="0d6481de46be83508b24ed2dbd8ebf99170db807e31fdec66ffa4b05a36754db542c9d1d8acd9ea9e60f9ad944a5c075f521e166f923abb153754016974bbdb4d4690f966ec4b837ac2700253984fcbfaee77ae5f3cdb1c24e235626339a373a1536c1d13905e5ca0b499810de649e7db0c5b71ea68cfa31be36f1187229ed0ead719166589dbdd93739778bed5e541e29e03009928ac8f8fc80f1a6f1e21e0b15bf75f7a34f13232866b281be8567c8035bc593e0c07401e6", 0xb9}, {&(0x7f0000000f40)="29080905fa99f7a16d8759a5b002960d9ab7ff98e788961b0663267bdca4d349243b00676acd971d89f34a0c9e770db59da2404936ffece8fed44536452f00c194101c579cf97bfa8088a93fc15af668e009c6a679d5e582de03cca3db8e867e7fbf57564b34ae375efa734408249ffddcae73dc45feb9a61234aa8ca0373f64edbf867992c6aba533f61d254dba9bca693281dffee373e184d4a29605442d4cbde6cf3224229e95", 0xa8}], 0x7, &(0x7f0000001180)=[@rights={0x28, 0x1, 0x1, [r3, r2, r4, r1, r4, r4]}, @cred={0x20, 0x1, 0x2, r8, r7, r9}, @cred={0x20, 0x1, 0x2, r10, r7, r11}, @rights={0x30, 0x1, 0x1, [r4, r2, r4, r0, r4, r0, r2, r0]}, @cred={0x20, 0x1, 0x2, r12, r7, r13}, @cred={0x20, 0x1, 0x2, r14, r7, r15}], 0xd8, 0x40000}, 0x800) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000480)={0x0, @rand_addr, @loopback}, &(0x7f00000004c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@local}}, &(0x7f0000000600)=0xe8) sendmsg$nl_xfrm(r0, &(0x7f0000000a40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4009400}, 0xc, &(0x7f0000001300)={&(0x7f0000001340)=ANY=[@ANYBLOB="880300001a0000042abd7000fedbdf2500000000000000000000000000000000ffffffff0000000000000000000000004e2300014e2300020a0080a00000000095dcded9d956babcd5050afe5b406855dfda2c1a818b5bfe42723f8f4bc5b0ae0eae1e42c0e8c9cc0285655bbdf076d6a611ff4644047447236454e8aa49b708afa3a9cbcf3e3d4f6426f84357681505f13fc81949bffa39a33adb07b58fd30d1e673246f5e51794e3d2c701f9", @ANYRES32=r5, @ANYRESHEX=r6, @ANYBLOB="e0000001000000000000000000000000000004d53200000000000000000000000000ffffac1414bb5b230000000000000600000000000000070000000000000005000000000000000104000000000000d30e000000000000000000000000000001000000000000007f00000000000000ffff0000000000000300000000000000ff7f00000000000001000000090000000700000025bd7000033500000a00000088000000000000000c000f0005000000000000000c0010000000000000000000e400060000000000000000000000000000000001000000000000000000000000000000004e2200054e2200090a00a0a0bf000000", @ANYRES32=r16, @ANYRES32=r17, @ANYRESDEC=r4], 0x7}, 0x1, 0x0, 0x0, 0x8000}, 0x0) 20:04:52 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0xfffffffd}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x3, 0x1) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0x4}, 0x2) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000240)={{0xffffffffffffffff, 0x2, 0x1, 0x3, 0x1}, 0x7fffffff, 0x9, 'id1\x00', 'timer1\x00', 0x0, 0x7, 0x5acd, 0x3, 0x800}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) [ 2939.527962] XFS (loop3): SB sanity check failed [ 2939.544337] XFS (loop2): SB sanity check failed [ 2939.552202] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2939.552289] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 20:04:52 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0xffffffffa0008000, 0x0) 20:04:52 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x0, 0x0, {0x21, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3, 0x200}}) [ 2939.622195] XFS (loop3): Unmount and run xfs_repair [ 2939.627482] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2939.656150] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2939.676123] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2939.685631] XFS (loop2): Unmount and run xfs_repair [ 2939.691194] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2939.698499] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2939.707139] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2939.717924] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2939.729645] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2939.742646] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2939.754711] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2939.763108] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2939.771591] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2939.780216] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2939.788829] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2939.797247] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2939.806067] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2939.822291] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2939.822400] XFS (loop3): SB validate failed with error -117. [ 2939.830524] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2939.844787] XFS (loop2): SB validate failed with error -117. 20:04:53 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:53 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x800800000000, 0x0) 20:04:53 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0x200000000000000}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:53 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x8) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) 20:04:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x4, 0x80) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000080)={{0x2, 0x7e4, 0x7, 0x9}, 'syz0\x00', 0x5}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) [ 2939.980653] XFS (loop2): SB sanity check failed [ 2939.998804] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2940.066823] XFS (loop2): Unmount and run xfs_repair [ 2940.085694] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2940.107069] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2940.136357] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2940.176136] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2940.184899] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2940.196520] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2940.205283] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2940.230338] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2940.241034] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2940.242309] XFS (loop3): SB sanity check failed [ 2940.249380] XFS (loop2): SB validate failed with error -117. [ 2940.262807] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2940.274480] XFS (loop3): Unmount and run xfs_repair [ 2940.279657] XFS (loop3): First 128 bytes of corrupted metadata buffer: 20:04:53 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:53 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000040)={0x2, 0x2000000000000000, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}) 20:04:53 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x3f000000, 0x0) 20:04:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r1, 0x0, 0x12, &(0x7f0000000040)=0xff, 0x4) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) 20:04:53 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0x3f00}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2940.286710] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2940.295116] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2940.303401] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 20:04:53 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000000c0)={0x101, 0xbac, 0x1, 0x0, 0x0, [{r1, 0x0, 0x7}]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 2940.337903] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2940.358958] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2940.379792] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 20:04:53 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0xffffffffffffffff, 0x0) [ 2940.397974] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2940.410647] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2940.420855] XFS (loop3): SB validate failed with error -117. 20:04:53 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:53 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0x100000000000000}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:53 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0xfcfdffff00000000, 0x0) 20:04:53 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e23, 0x1, @mcast1}, {0xa, 0x4e22, 0x100000000000, @dev={0xfe, 0x80, [], 0x1d}, 0x80}, 0x2, [0x6, 0xffffffffffff79b0, 0x3ff, 0x9, 0x800, 0x0, 0x1, 0x9]}, 0x5c) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002fc0)={{{@in6, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000030c0)=0xe8) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000140)={0x0, 0x0, {0x2, 0x1e, 0x13, 0x5, 0x4, 0xbd4e, 0x0, 0x5c, 0x1}}) recvfrom$packet(r0, &(0x7f0000000040)=""/6, 0x6, 0x100, &(0x7f0000003100)={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @local}, 0x14) 20:04:53 executing program 4: getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)=0x0) r1 = getegid() lchown(&(0x7f0000000040)='./file0\x00', r0, r1) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r2, 0x5452, &(0x7f0000000000)={0x2}) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000001c0)={"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"}) [ 2940.642980] XFS (loop2): SB sanity check failed [ 2940.647865] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2940.722877] XFS (loop2): Unmount and run xfs_repair [ 2940.732040] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2940.752296] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2940.765570] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2940.774674] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2940.783376] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2940.798529] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2940.807333] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2940.815977] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2940.816701] XFS (loop3): SB sanity check failed [ 2940.824681] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2940.837515] XFS (loop2): SB validate failed with error -117. [ 2940.845335] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2940.857061] XFS (loop3): Unmount and run xfs_repair [ 2940.862269] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2940.869020] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2940.877290] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2940.885498] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2940.893673] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2940.901832] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2940.910049] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2940.918263] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2940.926452] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2940.934686] XFS (loop3): SB validate failed with error -117. 20:04:54 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:54 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x80001, 0x0) perf_event_open(&(0x7f0000000180)={0xffffffffffffffff, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, &(0x7f0000000780)) r3 = memfd_create(&(0x7f0000000380)="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", 0x0) fsetxattr$security_smack_entry(r3, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f0000000280)='IPVS\x00', 0x5, 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r2, r3, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x8000000000044000) io_setup(0xb, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000680)=0x9) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x0) ioctl$TIOCGETD(r3, 0x5424, &(0x7f0000000300)) ioctl$LOOP_CLR_FD(r2, 0x4c01) r6 = creat(&(0x7f0000000640)='./file0\x00', 0x114) open(0x0, 0x40, 0x140) syz_genetlink_get_family_id$team(&(0x7f0000000740)='team\x00') accept$packet(r6, 0x0, &(0x7f0000002340)) getsockopt$inet6_mreq(r6, 0x29, 0x0, &(0x7f0000004140)={@local}, &(0x7f0000004180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r5, &(0x7f0000004a40)={&(0x7f00000006c0), 0xc, &(0x7f0000004a00)={&(0x7f0000004240)=ANY=[@ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040005000000080007000000000038000100240001006e6f746966"], 0x1}}, 0x0) r7 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r7, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) 20:04:54 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x800000000000000, 0x0) 20:04:54 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0x1000000}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:54 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) time(&(0x7f0000000080)) 20:04:54 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x5000000, 0x0) 20:04:54 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\b', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:54 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) prctl$PR_GET_TSC(0x19, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) getpgid(r2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDENABIO(r0, 0x4b36) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) 20:04:54 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0xffffff80}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:54 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x101000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee60, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xae03000000000000, &(0x7f0000000140)={0xa, 0x5, 0xb, 0x13a}, 0x2c) ioctl$RTC_WKALM_SET(r2, 0x5452, &(0x7f0000000000)={0x2}) 20:04:54 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x4000, 0x0) 20:04:54 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) socket$pppoe(0x18, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000000040)) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) [ 2941.394920] XFS (loop2): SB sanity check failed [ 2941.402533] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2941.458469] XFS (loop2): Unmount and run xfs_repair [ 2941.478792] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2941.508597] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2941.528998] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2941.552685] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2941.571217] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2941.582201] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2941.590436] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2941.598779] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2941.607105] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2941.615898] XFS (loop2): SB validate failed with error -117. [ 2941.723972] XFS (loop2): SB sanity check failed [ 2941.728771] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2941.743406] XFS (loop2): Unmount and run xfs_repair [ 2941.748433] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2941.755732] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2941.763979] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2941.772196] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2941.780333] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2941.788546] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2941.796740] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2941.804918] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2941.813137] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2941.821338] XFS (loop2): SB validate failed with error -117. 20:04:55 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0x4}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:55 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="7866738c", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:55 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000040)={'mangle\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0xfffffffffffffffe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}) 20:04:55 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0xf6ffffff, 0x0) 20:04:55 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="78667313", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:55 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x101000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee60, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xae03000000000000, &(0x7f0000000140)={0xa, 0x5, 0xb, 0x13a}, 0x2c) ioctl$RTC_WKALM_SET(r2, 0x5452, &(0x7f0000000000)={0x2}) 20:04:55 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc\x00', 0x400400000, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7002) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000040), &(0x7f0000000080)=0x4) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2a08}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x38, r2, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}]}, 0x38}, 0x1, 0x0, 0x0, 0x4004001}, 0x800) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3ada) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) 20:04:55 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x3f00, 0x0) 20:04:55 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0x3f00000000000000}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:55 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:55 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000040)={0x0, 0x400, 0x2, 0xeee, 0x0, 0x2, 0x3, 0x9b, {0x0, @in={{0x2, 0x4e24, @loopback}}, 0x1, 0x5, 0x80000001, 0x9, 0x40}}, &(0x7f0000000140)=0xb0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000001c0)={r2, 0x9e90}, 0x8) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) 20:04:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000040)={0x450, 0x10d, "f216482fe62d306836c35572b9653ade4c55cff42531678b104ed842d9f28c3f", 0x7, 0x2c161ecc, 0xd92, 0x1, 0x80}) 20:04:55 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0xfffffffe, 0x0) 20:04:55 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="786673fc", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) [ 2942.233057] XFS (loop3): SB sanity check failed [ 2942.242362] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2942.276265] XFS (loop3): Unmount and run xfs_repair [ 2942.286579] XFS (loop3): First 128 bytes of corrupted metadata buffer: 20:04:55 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0x80ffffff}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:55 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000180)={0x6, 0xffff, 0x3}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r0, 0x50, &(0x7f00000001c0)}, 0x10) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f0000000280)) write$cgroup_int(r0, &(0x7f0000000140)=0x5, 0x12) getsockopt$inet_dccp_int(r0, 0x21, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 20:04:55 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x4, 0x0) [ 2942.359292] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2942.391764] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2942.427097] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2942.442275] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ 20:04:55 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f00000000c0)={0x7fe, 0xc9, 0x2, 0x8, 0x9}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={'syzkaller0\x00', {0x2, 0x4e20, @remote}}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000080)={0x1, 0x0, {0x2d, 0x36, 0xa, 0x2, 0x7, 0x3, 0x2, 0x152, 0xffffffffffffffff}}) 20:04:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000040)={0x450, 0x10d, "f216482fe62d306836c35572b9653ade4c55cff42531678b104ed842d9f28c3f", 0x7, 0x2c161ecc, 0xd92, 0x1, 0x80}) 20:04:55 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0xfdffffff}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2942.487386] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2942.516006] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2942.525638] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ 20:04:55 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) [ 2942.625007] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2942.656416] XFS (loop3): SB validate failed with error -117. 20:04:55 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x4}}) fcntl$setstatus(r1, 0x4, 0x4000) 20:04:55 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000000000000000, 0x0) 20:04:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0x98f904}) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000040)={0x450, 0x10d, "f216482fe62d306836c35572b9653ade4c55cff42531678b104ed842d9f28c3f", 0x7, 0x2c161ecc, 0xd92, 0x1, 0x80}) 20:04:55 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:55 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0x400300}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2942.868693] XFS (loop2): SB sanity check failed [ 2942.877025] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 20:04:56 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000a0, 0x0) [ 2942.913838] XFS (loop2): Unmount and run xfs_repair [ 2942.927865] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2942.939654] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2942.953662] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ 20:04:56 executing program 5 (fault-call:0 fault-nth:0): syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:04:56 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) memfd_create(&(0x7f0000000040)='/dev/rtc\x00', 0x3) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000080)=0x60, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) 20:04:56 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0x2}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2942.982003] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2942.993247] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2943.017330] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2943.062509] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2943.113817] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2943.141223] FAULT_INJECTION: forcing a failure. [ 2943.141223] name failslab, interval 1, probability 0, space 0, times 0 [ 2943.152521] CPU: 1 PID: 12107 Comm: syz-executor5 Not tainted 4.20.0-rc5-next-20181207+ #163 [ 2943.161131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2943.170484] Call Trace: [ 2943.170524] dump_stack+0x244/0x39d [ 2943.170548] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2943.170587] should_fail.cold.4+0xa/0x17 [ 2943.177269] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2943.177287] ? print_usage_bug+0xc0/0xc0 [ 2943.177301] ? print_usage_bug+0xc0/0xc0 [ 2943.177316] ? kasan_check_read+0x11/0x20 [ 2943.177341] ? __mutex_lock+0x85e/0x16f0 [ 2943.206223] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2943.207957] ? tun_get_user+0x1e27/0x4240 [ 2943.207980] ? mutex_lock_io_nested+0x1570/0x1570 [ 2943.207996] ? __lock_acquire+0x62f/0x4c20 [ 2943.229355] ? mark_held_locks+0x130/0x130 [ 2943.233628] ? print_usage_bug+0xc0/0xc0 [ 2943.237700] ? up_write+0x7b/0x220 [ 2943.241247] __should_failslab+0x124/0x180 [ 2943.245500] should_failslab+0x9/0x14 [ 2943.249306] kmem_cache_alloc+0x47/0x730 [ 2943.253374] ? print_usage_bug+0xc0/0xc0 [ 2943.254279] XFS (loop2): SB validate failed with error -117. [ 2943.257433] ? __lock_acquire+0x62f/0x4c20 [ 2943.257452] __build_skb+0xab/0x430 [ 2943.257466] ? skb_try_coalesce+0x1b70/0x1b70 [ 2943.257482] ? __lock_acquire+0x62f/0x4c20 [ 2943.257499] ? __alloc_pages_nodemask+0xec0/0xec0 [ 2943.257516] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2943.257535] ? check_preemption_disabled+0x48/0x280 [ 2943.295351] __napi_alloc_skb+0x1d6/0x310 [ 2943.299505] napi_get_frags+0x67/0x140 [ 2943.303403] tun_get_user+0x1e9f/0x4240 [ 2943.307401] ? find_held_lock+0x36/0x1c0 [ 2943.311486] ? tun_net_xmit+0x1c90/0x1c90 [ 2943.315646] ? rcu_read_unlock_special+0x370/0x370 [ 2943.320608] ? graph_lock+0x270/0x270 [ 2943.324451] ? aa_file_perm+0x490/0x1060 [ 2943.328526] ? graph_lock+0x270/0x270 [ 2943.332344] ? find_held_lock+0x36/0x1c0 [ 2943.333329] XFS (loop3): SB sanity check failed [ 2943.336416] ? tun_get+0x206/0x370 [ 2943.336433] ? lock_downgrade+0x900/0x900 [ 2943.336447] ? check_preemption_disabled+0x48/0x280 [ 2943.336496] ? kasan_check_read+0x11/0x20 [ 2943.336525] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2943.336539] ? rcu_read_unlock_special+0x370/0x370 [ 2943.336572] ? tun_get+0x22d/0x370 [ 2943.360130] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2943.363318] ? tun_chr_close+0x180/0x180 [ 2943.363341] tun_chr_write_iter+0xb9/0x160 [ 2943.363359] do_iter_readv_writev+0x954/0xb80 [ 2943.363378] ? vfs_dedupe_file_range+0x700/0x700 [ 2943.363399] ? rw_verify_area+0x118/0x360 [ 2943.363417] do_iter_write+0x185/0x610 [ 2943.363431] ? dup_iter+0x260/0x260 20:04:56 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x9, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) readahead(r1, 0x1000, 0x1) socket$pptp(0x18, 0x1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x25dfdbfc, 0x800}, 0xc) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f00000000c0)=""/23) 20:04:56 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0xfffffff6, 0x0) [ 2943.363447] ? proc_cwd_link+0x1d0/0x1d0 [ 2943.378968] XFS (loop3): Unmount and run xfs_repair [ 2943.382989] vfs_writev+0x1f1/0x360 [ 2943.383008] ? vfs_iter_write+0xb0/0xb0 [ 2943.383027] ? wait_for_completion+0x8a0/0x8a0 [ 2943.383046] ? __lock_is_held+0xb5/0x140 [ 2943.383076] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2943.383090] ? __fdget_pos+0xde/0x200 [ 2943.383105] ? __fdget_raw+0x20/0x20 [ 2943.400654] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2943.404785] ? __sb_end_write+0xd9/0x110 [ 2943.404806] do_writev+0x11a/0x310 [ 2943.404823] ? vfs_writev+0x360/0x360 [ 2943.404841] ? trace_hardirqs_off_caller+0x310/0x310 [ 2943.404861] __x64_sys_writev+0x75/0xb0 [ 2943.404879] do_syscall_64+0x1b9/0x820 [ 2943.404890] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2943.404909] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2943.410157] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2943.412416] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2943.412433] ? trace_hardirqs_on_caller+0x310/0x310 [ 2943.412448] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2943.412479] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2943.412515] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2943.412535] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2943.412545] RIP: 0033:0x457421 [ 2943.412572] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 b5 fb ff c3 48 83 ec 08 e8 1a 2d 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 63 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 2943.420234] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2943.421616] RSP: 002b:00007fc15b966ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 2943.421629] RAX: ffffffffffffffda RBX: 000000000000007e RCX: 0000000000457421 [ 2943.421637] RDX: 0000000000000001 RSI: 00007fc15b966bf0 RDI: 00000000000000f0 [ 2943.421646] RBP: 00000000200000c0 R08: 00000000000000f0 R09: 0000000000000000 [ 2943.421654] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fc15b9676d4 [ 2943.421662] R13: 00000000004c4e4d R14: 00000000004d89d8 R15: 0000000000000003 [ 2943.511503] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 20:04:56 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:56 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x500000000000000, 0x0) 20:04:56 executing program 5 (fault-call:0 fault-nth:1): syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:04:56 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0x8}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2943.521908] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2943.553883] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2943.580190] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2943.639140] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2943.648318] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2943.657121] XFS (loop3): SB validate failed with error -117. [ 2943.722782] FAULT_INJECTION: forcing a failure. [ 2943.722782] name failslab, interval 1, probability 0, space 0, times 0 [ 2943.734063] CPU: 1 PID: 12132 Comm: syz-executor5 Not tainted 4.20.0-rc5-next-20181207+ #163 [ 2943.742646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2943.752011] Call Trace: [ 2943.754628] dump_stack+0x244/0x39d [ 2943.758261] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2943.763454] should_fail.cold.4+0xa/0x17 [ 2943.767515] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2943.772647] ? fib_insert_alias+0x1250/0x1250 [ 2943.777158] ? __lock_acquire+0x62f/0x4c20 [ 2943.781401] ? mark_held_locks+0x130/0x130 [ 2943.785656] ? mark_held_locks+0x130/0x130 [ 2943.789924] ? lock_unpin_lock+0x4a0/0x4a0 [ 2943.794170] ? lock_unpin_lock+0x4a0/0x4a0 [ 2943.798450] ? graph_lock+0x270/0x270 [ 2943.802287] __should_failslab+0x124/0x180 [ 2943.802316] should_failslab+0x9/0x14 [ 2943.802329] kmem_cache_alloc+0x47/0x730 [ 2943.802345] ? find_held_lock+0x36/0x1c0 [ 2943.810383] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2943.810401] dst_alloc+0xbb/0x1d0 [ 2943.810431] rt_dst_alloc+0x105/0x540 [ 2943.810452] ? fnhe_flush_routes+0x480/0x480 [ 2943.824125] ? rt_cache_valid+0xc2/0x250 [ 2943.831400] ? ipv4_dst_check+0x270/0x270 [ 2943.831426] ip_route_input_slow+0x1d04/0x3e80 [ 2943.831468] ? fib_multipath_hash+0x1090/0x1090 [ 2943.840010] ? __nf_conntrack_find_get.part.44+0x1105/0x1cf0 [ 2943.840039] ? graph_lock+0x270/0x270 [ 2943.848755] ? mark_held_locks+0x130/0x130 [ 2943.848772] ? nf_conntrack_tuple_taken+0x1120/0x1120 [ 2943.848792] ? graph_lock+0x270/0x270 [ 2943.848807] ? nf_ct_get_tuplepr+0x1b6/0x3a0 [ 2943.848826] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2943.848842] ? check_preemption_disabled+0x48/0x280 [ 2943.848875] ? lock_acquire+0x1ed/0x520 [ 2943.895234] ? __nf_conntrack_find_get.part.44+0x1cf0/0x1cf0 [ 2943.901057] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2943.906624] ? check_preemption_disabled+0x48/0x280 [ 2943.911655] ? kasan_check_read+0x11/0x20 [ 2943.915814] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2943.921104] ? rcu_softirq_qs+0x20/0x20 [ 2943.925103] ? nf_ct_tmpl_alloc+0x410/0x410 [ 2943.929427] ? __nf_ct_l4proto_find+0x113/0x1d0 [ 2943.934112] ? print_usage_bug+0xc0/0xc0 [ 2943.938234] ? nf_conntrack_find_get+0x9c/0xf0 [ 2943.942893] ? nf_conntrack_icmpv4_error+0x38d/0xb49 [ 2943.948010] ip_route_input_rcu+0x10a/0xd80 [ 2943.952345] ? ip_route_input_slow+0x3e80/0x3e80 [ 2943.957110] ? lock_acquire+0x1ed/0x520 [ 2943.961098] ? ip_route_input_rcu+0xd80/0xd80 [ 2943.965603] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2943.971147] ? check_preemption_disabled+0x48/0x280 [ 2943.976171] ? kasan_check_read+0x11/0x20 [ 2943.980325] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2943.985610] ? rcu_softirq_qs+0x20/0x20 [ 2943.989619] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2943.995169] ip_route_input_noref+0x11d/0x260 [ 2943.999674] ? ip_route_input_rcu+0xd80/0xd80 [ 2944.004200] ip_rcv_finish_core.isra.16+0x5b5/0x1f40 [ 2944.009326] ? ip_sublist_rcv_finish+0x3a0/0x3a0 [ 2944.014105] ? find_held_lock+0x36/0x1c0 [ 2944.018198] ? ip_rcv+0x3ee/0x600 [ 2944.021681] ? lock_downgrade+0x900/0x900 [ 2944.025840] ? check_preemption_disabled+0x48/0x280 [ 2944.030886] ? kasan_check_read+0x11/0x20 [ 2944.035026] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2944.040287] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2944.045290] ? rcu_read_unlock_special+0x370/0x370 [ 2944.050224] ip_rcv_finish+0xc6/0x300 [ 2944.054081] ip_rcv+0xed/0x600 [ 2944.057280] ? ip_local_deliver+0x750/0x750 [ 2944.061605] ? pvclock_read_flags+0x160/0x160 [ 2944.066112] ? ip_rcv_finish_core.isra.16+0x1f40/0x1f40 [ 2944.068812] XFS (loop2): SB sanity check failed [ 2944.071479] ? lock_acquire+0x1ed/0x520 [ 2944.071505] __netif_receive_skb_one_core+0x14d/0x200 [ 2944.071525] ? __netif_receive_skb_core+0x37f0/0x37f0 [ 2944.071539] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2944.071553] ? rcu_softirq_qs+0x20/0x20 [ 2944.071587] __netif_receive_skb+0x2c/0x1e0 [ 2944.076970] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2944.080217] netif_receive_skb_internal+0x12c/0x800 [ 2944.080233] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2944.080249] ? dev_cpu_dead+0xac0/0xac0 [ 2944.080271] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2944.080301] ? eth_type_trans+0x2d2/0x6e0 [ 2944.080320] ? eth_gro_receive+0x920/0x920 [ 2944.087460] XFS (loop3): SB sanity check failed [ 2944.090698] napi_gro_frags+0xd9a/0x1060 [ 2944.090722] ? napi_gro_receive+0xa00/0xa00 [ 2944.090741] ? skb_flow_dissector_bpf_prog_detach+0x2a0/0x2a0 [ 2944.090761] ? __local_bh_enable_ip+0x160/0x260 [ 2944.096218] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2944.100008] ? eth_get_headlen+0x173/0x1f0 [ 2944.100026] ? eth_type_trans+0x6e0/0x6e0 [ 2944.100045] ? tun_get_user+0x3124/0x4240 [ 2944.100063] tun_get_user+0x314d/0x4240 [ 2944.104994] XFS (loop2): Unmount and run xfs_repair [ 2944.115449] ? find_held_lock+0x36/0x1c0 [ 2944.115484] ? tun_net_xmit+0x1c90/0x1c90 [ 2944.115501] ? rcu_read_unlock_special+0x370/0x370 [ 2944.115516] ? graph_lock+0x270/0x270 [ 2944.115537] ? aa_file_perm+0x490/0x1060 [ 2944.115552] ? graph_lock+0x270/0x270 [ 2944.115583] ? find_held_lock+0x36/0x1c0 [ 2944.121116] XFS (loop3): Unmount and run xfs_repair [ 2944.126169] ? tun_get+0x206/0x370 [ 2944.126187] ? lock_downgrade+0x900/0x900 [ 2944.126201] ? check_preemption_disabled+0x48/0x280 [ 2944.126221] ? kasan_check_read+0x11/0x20 [ 2944.126235] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2944.126250] ? rcu_read_unlock_special+0x370/0x370 [ 2944.126271] ? tun_get+0x22d/0x370 [ 2944.130850] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2944.135783] ? tun_chr_close+0x180/0x180 [ 2944.135822] tun_chr_write_iter+0xb9/0x160 [ 2944.135841] do_iter_readv_writev+0x954/0xb80 [ 2944.135861] ? vfs_dedupe_file_range+0x700/0x700 [ 2944.135883] ? rw_verify_area+0x118/0x360 [ 2944.135901] do_iter_write+0x185/0x610 [ 2944.135918] ? dup_iter+0x260/0x260 [ 2944.140478] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2944.144281] ? proc_cwd_link+0x1d0/0x1d0 [ 2944.144307] vfs_writev+0x1f1/0x360 [ 2944.144327] ? vfs_iter_write+0xb0/0xb0 [ 2944.144348] ? wait_for_completion+0x8a0/0x8a0 [ 2944.144367] ? __lock_is_held+0xb5/0x140 [ 2944.144391] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2944.149476] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2944.153091] ? __fdget_pos+0xde/0x200 [ 2944.153107] ? __fdget_raw+0x20/0x20 [ 2944.153122] ? __sb_end_write+0xd9/0x110 [ 2944.153146] do_writev+0x11a/0x310 [ 2944.153165] ? vfs_writev+0x360/0x360 [ 2944.153185] ? trace_hardirqs_off_caller+0x310/0x310 [ 2944.153207] __x64_sys_writev+0x75/0xb0 [ 2944.153226] do_syscall_64+0x1b9/0x820 [ 2944.159030] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2944.163417] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2944.163436] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2944.163450] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2944.163467] ? trace_hardirqs_on_caller+0x310/0x310 [ 2944.163484] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2944.163499] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2944.163525] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2944.170238] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2944.179276] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2944.179288] RIP: 0033:0x457421 [ 2944.179302] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 b5 fb ff c3 48 83 ec 08 e8 1a 2d 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 63 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 2944.179310] RSP: 002b:00007fc15b966ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 2944.179323] RAX: ffffffffffffffda RBX: 000000000000007e RCX: 0000000000457421 [ 2944.179331] RDX: 0000000000000001 RSI: 00007fc15b966bf0 RDI: 00000000000000f0 [ 2944.179340] RBP: 00000000200000c0 R08: 00000000000000f0 R09: 0000000000000000 [ 2944.179348] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fc15b9676d4 [ 2944.179355] R13: 00000000004c4e4d R14: 00000000004d89d8 R15: 0000000000000003 [ 2944.181726] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2944.187785] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2944.210155] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2944.221281] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2944.222389] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2944.228997] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2944.230190] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2944.230200] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2944.230211] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2944.230237] XFS (loop3): SB validate failed with error -117. 20:04:57 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:57 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={0xffff, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x16}}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e21, @remote}, 0x20, 0x8000, 0x1f, 0x1, 0x2, &(0x7f0000000140)='ip6gre0\x00', 0x8, 0x2, 0x9}) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0x8008ae9d, &(0x7f0000000080)=""/112) 20:04:57 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x2000000, 0x0) 20:04:57 executing program 5 (fault-call:0 fault-nth:2): syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:04:57 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0xffffff7f}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2944.240527] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2944.253117] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2944.593267] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2944.604761] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2944.614789] XFS (loop2): SB validate failed with error -117. 20:04:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:57 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x300, 0x0) 20:04:57 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) 20:04:57 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:04:58 executing program 5: syz_emit_ethernet(0x2a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:04:58 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x1000000000000, 0x0) [ 2944.868049] XFS (loop2): SB sanity check failed [ 2944.873673] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2944.931750] XFS (loop2): Unmount and run xfs_repair 20:04:58 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0x4000000}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2944.956072] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2944.985129] XFS (loop3): SB sanity check failed [ 2944.988985] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2945.004203] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2945.032328] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2945.043021] XFS (loop3): Unmount and run xfs_repair [ 2945.055409] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2945.059414] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2945.072426] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2945.075965] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2945.082884] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2945.097908] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2945.106417] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2945.115490] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2945.119894] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2945.125406] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2945.133079] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2945.140483] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2945.157029] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2945.162676] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2945.165378] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2945.174126] XFS (loop2): SB validate failed with error -117. [ 2945.182046] XFS (loop3): SB validate failed with error -117. 20:04:58 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="78667301", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:58 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) getresuid(&(0x7f0000000340)=0x0, &(0x7f0000000380), &(0x7f00000003c0)) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1028084, &(0x7f00000004c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x7000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x6}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0x1600}}, {@max_read={'max_read', 0x3d, 0x4}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x8}}], [{@measure='measure'}]}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x6, 0x1, 0x6, 0x100, 0x0, 0xf6, 0x1, 0x6, 0xffffffffffff52fe, 0x47, 0x8, 0x2, 0x8001, 0x1ff, 0x5, 0x4, 0x2, 0x95, 0x6, 0x3, 0x1, 0x80000000, 0x1, 0xb, 0x4, 0x7, 0x100000000, 0x7b6, 0x9, 0x4, 0x983c, 0x6, 0xff, 0x532c, 0x80000000, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x10080, 0x8, 0x3, 0x7, 0x1ff, 0x0, 0xfff}, 0x0, 0x4, r0, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x7fff) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000140)={0x0, 0x80}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000280)={r3, 0x9}, 0x8) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040)=0x3, 0x4) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6}}) sendfile(r0, r0, &(0x7f0000000080), 0x0) 20:04:58 executing program 5: syz_emit_ethernet(0x140, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:04:58 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x3000000, 0x0) 20:04:58 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0x800000000000000}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:58 executing program 5: syz_emit_ethernet(0xd, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:04:58 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:58 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x2, 0x2) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) 20:04:58 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0xfeffffff, 0x0) 20:04:58 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0x19ed3fca4b020000}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:58 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x1008, 0x0) 20:04:58 executing program 5: syz_emit_ethernet(0x2000013e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:04:58 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="786673fc", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:58 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) r1 = semget$private(0x0, 0x7, 0xa) semctl$IPC_INFO(r1, 0x7, 0x3, &(0x7f0000000200)=""/46) sysinfo(&(0x7f0000000280)=""/54) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000300), 0x4) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000040)=0x4, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400204) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000240)={0x18, 0x1, 0x0, {0xffffffffffffffde}}, 0x18) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000000c0)=0x100, 0x4) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000002c0)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dsp\x00', 0x8020000001fffd, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x20201, 0x0) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f00000001c0)={0x34, 0x0, &(0x7f0000000140)}) 20:04:58 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8800000, 0x0) 20:04:58 executing program 5: syz_emit_ethernet(0x7ffff000, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2945.735773] XFS (loop2): SB sanity check failed [ 2945.740659] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 20:04:58 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) [ 2945.796054] XFS (loop2): Unmount and run xfs_repair 20:04:59 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0xffffff7f00000000}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2945.824475] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2945.866657] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2945.901766] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2945.930925] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2945.968930] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2945.984122] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2945.992358] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2946.000496] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2946.009087] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2946.017370] XFS (loop2): SB validate failed with error -117. [ 2946.121160] XFS (loop2): SB sanity check failed [ 2946.126403] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2946.138981] XFS (loop2): Unmount and run xfs_repair [ 2946.144116] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2946.150799] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2946.159672] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2946.167948] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2946.176145] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2946.184385] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2946.193017] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2946.201144] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2946.209336] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2946.217573] XFS (loop2): SB validate failed with error -117. 20:04:59 executing program 5: syz_emit_ethernet(0xfffffffffffffdef, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:04:59 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x200000000000000, 0x0) 20:04:59 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:59 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f00000000c0)) 20:04:59 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="7866739e", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:04:59 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0x3f000000}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:59 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0xffffffffffffff7f, 0x0) 20:04:59 executing program 5: syz_emit_ethernet(0xfffffdef, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:04:59 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000080)={0x9149, 0x2, 0x1}) write$FUSE_IOCTL(r0, &(0x7f0000000040)={0x20, 0x0, 0x5, {0x7ff, 0x0, 0x5d2, 0x8}}, 0x20) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) 20:04:59 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x7ffffffffffff, 0x0) 20:04:59 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0x34000}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:04:59 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:04:59 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) [ 2946.512323] XFS (loop3): SB sanity check failed [ 2946.523666] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 20:04:59 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) [ 2946.591690] XFS (loop3): Unmount and run xfs_repair [ 2946.622491] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2946.634294] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2946.646815] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2946.667489] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2946.687542] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2946.703965] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2946.721528] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2946.752055] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2946.760849] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2946.769586] XFS (loop3): SB validate failed with error -117. [ 2946.777954] XFS (loop2): SB sanity check failed [ 2946.782796] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2946.794233] XFS (loop2): Unmount and run xfs_repair [ 2946.799247] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2946.806184] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2946.814499] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2946.822813] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2946.830998] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2946.839214] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2946.847390] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2946.855661] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2946.863823] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2946.872012] XFS (loop2): SB validate failed with error -117. 20:05:00 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="786673ac", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:00 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x806, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:00 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) faccessat(r0, &(0x7f0000000040)='./file0\x00', 0x100, 0xee7ff85b818a53be) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) 20:05:00 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x3f00000000000000, 0x0) 20:05:00 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0x80ffffff00000000}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:00 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:00 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x300000000000000, 0x0) 20:05:00 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000080)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f00000000c0)={r2, 0x80000, r0}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$alg(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)="a5f22c9b8e8c13954ffc81afc30d6705a55e5c62cb5922a0f3429594df1f6cbdefbe2ba0201693fecf2ba38e00e2deb4169b2fdb0abd1f402405bc747385dfa27342a58f428a18194b50ce1b95f82e01039e9c08ed6cd0a62f3df54b7441a0bb2d0c0b63f19e447836a06197938b88c333952cdbf249518c167ca2cc3cfc77780581d113cf8da713a0f5f7305f9f41954fb0b157cd76eb9cd1611aee79f30ff0803acb346ae7020d5dc430c70e9ee0aa8016964e944425c9873c9f1e2d434b064f2faf98a0840bb5662127e5e619a463ff243acd93af6c15c540", 0xda}, {&(0x7f00000002c0)="648de94e8c9af624ee0f0d146f2627d07cc3f21488bd77134ae67ad53e1a45cdeb0760598ae51fa52ba83e2a3244db794fe463ec248b2e12e184e00684121e959cfc6dae53", 0x45}, {&(0x7f0000000340)="374057552fbace429ca9ae5b86f5c71db57bc6cedb758adfb90711b144466b1775acb17e68d23db91a9d03de0dc5070ff82a8c24db85f20d1fb8a1180d082144b65c077acbb0258a13e05564d91ae8883e2b9ce0f9b08389f81f85c58b29f26b46d818801050efca3bdc5c8746ac8b322adf6184af49e753dc0179467a34a1487abd913eb7eb5978fa424067135af7a0cf0ea2249fd0", 0x96}], 0x3, &(0x7f0000000400)=[@iv={0x88, 0x117, 0x2, 0x72, "71df1f37fa2f5974f58800ef2e96333187c687af2362c58d40fc93c552b552857cae35f7f965053dd6baef5c551c7c54a951857486f194edf73066b5d4cd4c6463e590832fd78a3ad0af710af600342d52614e9bd4649f2b715d111920f0ee1cbcef9c9636e81f6e322ef92c5846d074544e"}, @iv={0xc8, 0x117, 0x2, 0xb1, "a1669fef27fc83bcdc2d3b064bf4d7759e02b721dd1c8be7ed1e9a873c6d6ac9579d490b0d99f741f442f60ba85393238d7989a68b49ff74245e007470d47b6757504a10609044f6d0d01390793bff1c3cfac78487b16567ac3621f56633af8b86fd1d3d85c375a9de4f9e2dd6ef154a442ab152cadfdf82de0518e283210e1920edcf34035f9b19b66f4d72774b95e4474543853663db4741cbf49f4cd169898646d517c1c4fd66a69bb4039b96145737"}, @assoc={0x18, 0x117, 0x4, 0xafe2}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x9}, @iv={0x1018, 0x117, 0x2, 0x1000, "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"}, @assoc={0x18, 0x117, 0x4, 0x6}, @assoc={0x18, 0x117, 0x4, 0x8}, @op={0x18, 0x117, 0x3, 0x1}], 0x11f8, 0x8000}, 0x44) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) 20:05:00 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x8848, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:00 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x1000000, 0x0) 20:05:00 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}}) 20:05:00 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x2, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:00 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:00 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x500, 0x0) 20:05:00 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x500, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:00 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f00000001c0)=""/249) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$bt_l2cap(r0, &(0x7f0000000140)={0x1f, 0x701160a9, {0x2, 0x5, 0x3, 0x6, 0x7fff, 0x9}, 0x61, 0x4ab3f2b7}, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400204) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f0000000040)=""/2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000080)={0x1, 0x70, 0x9, 0x80000001, 0x1000, 0x10001, 0x0, 0x9, 0x82, 0x8, 0x1, 0x3, 0x31, 0x4, 0xffffffffffffffe1, 0x9da0ad8, 0x0, 0xc5d, 0x7f, 0x0, 0x2, 0x9, 0x6, 0x80000000, 0x4, 0x100000001, 0x0, 0x5, 0x2, 0x4, 0x9, 0x7fc00, 0x2, 0x3, 0x1, 0x9, 0x9, 0x10000, 0x0, 0x7, 0x6, @perf_config_ext={0x3f, 0x3b028617}, 0x240, 0x100000001, 0x7, 0x7, 0x10000, 0x6, 0x180}) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) 20:05:00 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0xfb, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2947.438772] XFS (loop2): SB sanity check failed [ 2947.448225] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2947.530243] XFS (loop2): Unmount and run xfs_repair [ 2947.548201] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2947.556209] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2947.570981] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2947.580382] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2947.593135] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2947.602233] XFS (loop3): SB sanity check failed [ 2947.605859] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2947.607117] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2947.620152] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2947.635176] XFS (loop3): Unmount and run xfs_repair [ 2947.640841] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2947.641604] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2947.657124] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2947.664430] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2947.665645] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2947.674679] XFS (loop2): SB validate failed with error -117. [ 2947.681801] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2947.695957] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2947.704171] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2947.712364] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2947.720530] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2947.728718] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2947.736945] XFS (loop3): SB validate failed with error -117. 20:05:01 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x7fffffffffffffff, 0x0) 20:05:01 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x80d, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:01 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000040)) 20:05:01 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:01 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0xfffffffb, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:01 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x803, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:01 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x4, 0x0, 0x0, 0x9}}) prctl$PR_GET_FP_MODE(0x2e) 20:05:01 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:01 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x3, 0x0) 20:05:01 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x8000a0ffffffff, 0x0) 20:05:01 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x1a, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:01 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x10000000, 0x0) 20:05:01 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x8035, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:01 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x28, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:01 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) socketpair$unix(0x1, 0x100000000007, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) finit_module(r0, &(0x7f0000000080)='/dev/rtc\x00', 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x100, 0x0) [ 2948.176193] XFS (loop2): SB sanity check failed [ 2948.205647] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2948.250312] XFS (loop2): Unmount and run xfs_repair [ 2948.260420] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2948.267495] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2948.307593] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2948.323312] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2948.335885] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2948.346009] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2948.355604] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2948.364071] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2948.372441] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2948.380809] XFS (loop2): SB validate failed with error -117. [ 2948.464054] XFS (loop2): SB sanity check failed [ 2948.468823] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2948.481359] XFS (loop2): Unmount and run xfs_repair [ 2948.487188] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2948.498315] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2948.507321] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2948.515530] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2948.523757] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2948.531907] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2948.540351] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2948.548557] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2948.556764] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2948.564963] XFS (loop2): SB validate failed with error -117. 20:05:01 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="7866731b", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:01 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="a5dbbaa93017fe3933cefb45882bfa5056a7f4e1668b43a30461cf00940ad679777191ff148201714ae08984f2494fc3a3260e85d2002f14b45e29a31b01273fd77af6a236fa0f2411e47ebe599ac22a11a429bd76c22ef0") setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000040)=0xfffffffffffff001, 0x4) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180), 0x0, 0x0) recvfrom(r0, &(0x7f0000000140)=""/208, 0xd0, 0x1, &(0x7f0000000240)=@pptp={0x18, 0x2, {0x1, @local}}, 0x80) 20:05:01 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x8100, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:01 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="786673a0", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:01 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xffff) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) 20:05:01 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x18, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:01 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x4305, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:01 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff}}) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f00000000c0)={0x6}) 20:05:01 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x3, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:01 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x870, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:01 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) 20:05:02 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x85c, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:02 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) [ 2949.063254] XFS (loop2): SB sanity check failed [ 2949.068131] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2949.086364] XFS (loop2): Unmount and run xfs_repair [ 2949.091520] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2949.103188] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2949.111355] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2949.119924] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2949.128129] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2949.128141] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2949.128152] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2949.128163] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2949.128173] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2949.132286] XFS (loop2): SB validate failed with error -117. [ 2949.275845] XFS (loop2): SB sanity check failed [ 2949.282292] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2949.293845] XFS (loop2): Unmount and run xfs_repair [ 2949.299216] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2949.306267] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2949.314639] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2949.323208] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2949.331335] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2949.339659] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2949.347904] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2949.356161] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2949.364324] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2949.372542] XFS (loop2): SB validate failed with error -117. 20:05:02 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:02 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x7) 20:05:02 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:05:02 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfsp', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:02 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x807, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:02 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x9, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:02 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x808, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:02 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f00000000c0)={0x14, 0x49, 0x1, {0x20, 0x2, 0x2}}, 0x14) connect$bt_sco(r1, &(0x7f0000000140)={0x1f, {0xfffffffffffff020, 0x9, 0x8c, 0x2, 0x6, 0x1}}, 0x8) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:05:02 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@dev, 0x0}, &(0x7f0000000540)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000000c0)={'vcan0\x00', r1}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@multicast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000440)={@in={{0x2, 0x4e20, @empty}}, 0x0, 0xff, 0x800000000, "f903be991be37cee4a7e10070caac42720aae7cb8d9b520b44b9bbd507dd12a5f0f2c8aa9b7d0819e927debf6d6805fa110be585f9b4a3319fac9387fbedb355a8240b21e4404d316614515840c0848d"}, 0xd8) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)=@updsa={0xf0, 0x1a, 0x320, 0x70bd29, 0x25dfdbff, {{@in6=@dev={0xfe, 0x80, [], 0x10}, @in6=@mcast2, 0x4e24, 0xf566, 0x4e21, 0x1ff, 0xa, 0x80, 0x20, 0x3f, r2, r3}, {@in6=@loopback, 0x4d3, 0x7c}, @in6=@remote, {0x7, 0x6, 0x7, 0x318, 0x5, 0x9, 0x1, 0x3ff}, {0x1, 0x10000, 0x81, 0x4}, {0x7ff, 0x7f, 0x80000001}, 0x70bd2b, 0x0, 0xa, 0x7, 0xffff, 0x20}}, 0xf0}, 0x1, 0x0, 0x0, 0x40000}, 0x8084) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 20:05:02 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:02 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x17, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:02 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x300, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2949.700086] XFS (loop3): SB sanity check failed [ 2949.705368] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2949.746195] XFS (loop3): Unmount and run xfs_repair [ 2949.756763] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2949.789517] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2949.804826] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2949.815019] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2949.835178] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2949.844024] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2949.852965] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2949.861330] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2949.870035] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2949.878885] XFS (loop3): SB validate failed with error -117. [ 2949.886295] XFS (loop2): SB sanity check failed [ 2949.896985] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2949.908361] XFS (loop2): Unmount and run xfs_repair [ 2949.913556] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2949.920265] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2949.929056] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2949.937270] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2949.937282] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2949.937292] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2949.937302] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2949.937326] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2949.937336] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2949.937363] XFS (loop2): SB validate failed with error -117. 20:05:03 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="786673fc", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:03 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x7fffffff, 0x600100) fsetxattr$security_evm(r1, &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000140)=@sha1={0x1, "b994f19a94a639b66ebc2938e0ced5fac90bd863"}, 0x15, 0x2) syz_open_dev$sg(&(0x7f0000000840)='/dev/sg#\x00', 0xaf, 0x0) mkdirat(r1, &(0x7f00000002c0)='./file1\x00', 0x100) sendto(r1, &(0x7f00000001c0)="73e8d0275805f90874734d3473a640465f3ec68297dc8f03da89e6a623a3fea9a8afa0aa29499b69ec41e4093783603c346034703f6774c28b7b95241f0a403ae7279b46e23d92fd263dae0a0ec0fd54598f2ddfca420d1664b8d23c004e8663deea3b96d227018d13", 0x69, 0x0, &(0x7f0000000240)=@un=@abs={0x0, 0x0, 0x4e24}, 0x80) ioctl$RTC_PIE_OFF(r1, 0x7006) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") ioctl$VIDIOC_S_PRIORITY(r1, 0x40045644, 0x3) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000340)={{0x9, 0x0, 0x8, 0x7, 'syz1\x00', 0x9c1}, 0x0, [0x5, 0xbb1, 0x1, 0x2, 0x4, 0x100, 0x401, 0x0, 0x401, 0x7, 0xffff, 0x200, 0x200, 0x5f8fc581, 0x7ff, 0x90, 0x1f, 0x3dd4, 0xff, 0x1, 0x80000001, 0x9, 0xff, 0x818, 0x9, 0xfffffffffffffff8, 0x8, 0x2, 0x1, 0x4, 0x8, 0x3, 0x1ff, 0x800, 0x3ff, 0x6b, 0x80000001, 0xb10, 0x38000000000000, 0xdd19, 0x9, 0x5, 0xe766, 0x8, 0xfffffffffffffff9, 0x6, 0xbe, 0xffffffffffffffc1, 0x7, 0x3, 0xffffffffffffffff, 0x7fff, 0xffffffffffffffe1, 0xec, 0x1, 0x8, 0x1, 0x4, 0x2, 0x1439, 0x0, 0x3, 0x7ff, 0x36, 0xffffffffffff3435, 0x8, 0x5, 0xdf01, 0x4, 0x1, 0x2, 0x6, 0x3, 0x400, 0x4, 0x8, 0x8, 0x3e000000000000, 0x8000, 0x2, 0xa00000000000, 0x0, 0xcf0a, 0x400, 0x8, 0x0, 0x1, 0x2b4, 0x400, 0xec, 0x4, 0x20, 0x4, 0x2, 0x8, 0x0, 0x9, 0xfffffffffffffffe, 0x3, 0x1, 0xba, 0x200, 0x4, 0x552dd759, 0x5, 0xc0d5, 0x9, 0x7, 0xfff, 0x9, 0x0, 0x1, 0x544f, 0x0, 0x8001, 0x40, 0x1f, 0x8000, 0x2, 0x7, 0x3ff, 0xfffffffffffff383, 0x4, 0x1, 0x7, 0x0, 0x0, 0x4909], {r2, r3+30000000}}) 20:05:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x5452, &(0x7f0000000000)={0x2}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x1, 0x0) 20:05:03 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x600, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:03 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x8, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2950.105826] XFS (loop2): SB sanity check failed [ 2950.111063] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 20:05:03 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xffff, 0x2800) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000001c0)="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") ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f00000000c0)={r2, 0xb}) 20:05:03 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x8847, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:03 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00pp') syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) [ 2950.168639] XFS (loop2): Unmount and run xfs_repair 20:05:03 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) [ 2950.211803] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2950.254851] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2950.284358] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2950.292862] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2950.301430] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2950.326158] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2950.365213] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2950.381899] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2950.390858] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2950.399927] XFS (loop2): SB validate failed with error -117. 20:05:03 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:03 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x100000000000000, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:03 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) poll(&(0x7f0000000080)=[{r0, 0x100}, {r1, 0x22}, {r0, 0x10}, {r3, 0x41b}], 0x4, 0x5) 20:05:03 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x802, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:03 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) [ 2950.429936] XFS (loop3): SB sanity check failed [ 2950.434699] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2950.456835] XFS (loop3): Unmount and run xfs_repair [ 2950.461925] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2950.469775] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ 20:05:03 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x100, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000080)=0x3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) [ 2950.498994] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2950.518474] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 20:05:03 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x80a, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:03 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x2000000000890e, &(0x7f0000000140)="c0ffffffffffffff711d4dda8e2f8f7070000000000000000000") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) r1 = semget$private(0x0, 0x1, 0x4a) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000040)=""/107) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x3, 0x40000) [ 2950.546433] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2950.580803] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 20:05:03 executing program 4: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) r1 = accept4$vsock_stream(0xffffffffffffff9c, &(0x7f0000000200)={0x28, 0x0, 0x2710}, 0x10, 0x80800) tee(r0, r1, 0xfffffffffffffff7, 0x6) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) pread64(r2, &(0x7f0000000040)=""/131, 0x83, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'bcsf0\x00', 0x1000}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r2, 0x5452, &(0x7f0000000000)={0x2, 0x0, {0x23}}) 20:05:03 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x2000000, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2950.629926] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2950.647460] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ 20:05:03 executing program 0: socket$pppoe(0x18, 0x1, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="e0ed6ca92dfa48e922b9189b5c1dacd0169c798897c5b6965c6491e939de90409829ddd04c5594b4e50f8fd083cce5f238d0c57c2378cfefe088282c497ca33b94075b4a258d17ee8b0a2ab093ae8d1575868a4edabec2ad453e3ac2eb46dac7d5b3484e0b3f2f8148727796") ioctl(r0, 0x1, &(0x7f00000003c0)="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") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) [ 2950.695976] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2950.742396] XFS (loop3): SB validate failed with error -117. [ 2950.748983] XFS (loop2): SB sanity check failed [ 2950.753961] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2950.793455] XFS (loop2): Unmount and run xfs_repair [ 2950.799959] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2950.807723] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2950.816151] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2950.824781] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2950.833084] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2950.833101] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2950.849861] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2950.863213] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2950.871477] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2950.879786] XFS (loop2): SB validate failed with error -117. 20:05:04 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) [ 2951.000872] XFS (loop2): SB sanity check failed [ 2951.010597] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2951.021960] XFS (loop2): Unmount and run xfs_repair [ 2951.027082] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2951.033966] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2951.042686] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2951.042713] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2951.042724] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2951.042735] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2951.042751] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2951.084089] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2951.099991] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2951.109773] XFS (loop2): SB validate failed with error -117. 20:05:04 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:04 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x4800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:04 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:05:04 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x3f00, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:04 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r1, &(0x7f0000000540)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=@ipv4_newrule={0x28, 0x20, 0x1, 0x0, 0x0, {0x2006, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, [@FRA_DST={0x8, 0x1, @local}]}, 0x28}}, 0x0) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:05:04 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x8906, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:04 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0xfffffffd, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:04 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x610002, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) [ 2951.241186] XFS (loop3): SB sanity check failed [ 2951.247424] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2951.272079] XFS (loop3): Unmount and run xfs_repair [ 2951.323625] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2951.366611] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2951.388050] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2951.407661] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2951.408106] XFS (loop2): SB sanity check failed [ 2951.424272] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2951.426438] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2951.444049] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2951.452554] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2951.464843] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2951.468720] XFS (loop2): Unmount and run xfs_repair [ 2951.474457] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2951.480489] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2951.486605] XFS (loop3): SB validate failed with error -117. [ 2951.493683] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2951.508164] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2951.517754] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2951.526111] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2951.534446] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2951.543334] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2951.551534] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2951.559802] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:05:04 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_udp_int(r0, 0x11, 0x66, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000280)=0x6, &(0x7f00000002c0)=0x2) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)={0x10000000}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000140)={0x0}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000200)={r2, 0x8}, 0x8) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2, 0x1}) 20:05:04 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:04 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x10000000, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2951.559830] XFS (loop2): SB validate failed with error -117. 20:05:04 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="78667303", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:04 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:04 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x400, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:05:04 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x700, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:04 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x24bca3fed19, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:04 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0xea, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x221, &(0x7f0000000400)=""/160}, 0x48) 20:05:04 executing program 0: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4000) write$selinux_attr(r0, &(0x7f00000000c0)='system_u:object_r:removable_device_t:s0\x00', 0x28) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000140)=0x9) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:05:04 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x814, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:05 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0xfc, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r1, 0x8818564c, &(0x7f00000001c0)) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:05:05 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") accept4$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14, 0x800) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000140)={@dev={0xfe, 0x80, [], 0xb}, r2}, 0x14) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:05:05 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x8, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:05 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x80b, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2952.104532] XFS (loop2): SB sanity check failed [ 2952.109440] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2952.130520] XFS (loop2): Unmount and run xfs_repair [ 2952.137523] XFS (loop2): First 128 bytes of corrupted metadata buffer: 20:05:05 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="78667303", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) [ 2952.165342] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2952.184690] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2952.204181] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2952.223875] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2952.232216] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2952.240457] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2952.249413] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2952.258432] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2952.266775] XFS (loop2): SB validate failed with error -117. 20:05:05 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) 20:05:05 executing program 4: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) 20:05:05 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:05 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:05 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x2, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:05 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:05 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:05 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000006c40)=ANY=[@ANYBLOB="00000000001c3adde6863809aa0000004e2311b580fbf902bf4059f358dc1ab73301f0ffffc2eed78c43937aad9a8aafe827389338a0ddbe9f63e9b1a3abe483a608e2d94fcadcb572c54f42bb8c0d"], 0x4f) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:05:05 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") fsetxattr$security_selinux(r0, &(0x7f0000000040)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28, 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0055fc1cd4b43f480303651f5047b37677330f15cd6485c53d0c90038315f284b6f8cac474f239815b094085bc50453071f862fc5073cddb5f0e610e5d1e005ea34776ec994218c169f05e2a00c8b483cc2f2e1ebd8fc41c1e71cf6c", @ANYRES16=r2, @ANYBLOB="08022cbd7000fcdbdf25030000000c0008000500000000000000"], 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x0) recvmmsg(r1, &(0x7f0000001780)=[{{&(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000001700)=[{&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/199, 0xc7}, {&(0x7f0000000200)=""/24, 0x18}, {&(0x7f00000014c0)=""/139, 0x8b}, {&(0x7f0000001580)=""/38, 0x26}, {&(0x7f00000015c0)=""/155, 0x9b}, {&(0x7f0000001680)=""/72, 0x48}], 0x7, 0x0, 0x0, 0x4c88}, 0x7ff}], 0x1, 0x1, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:05:05 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x40030000000000, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:05 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x4, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2952.685285] XFS (loop2): SB sanity check failed [ 2952.690671] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2952.737847] XFS (loop2): Unmount and run xfs_repair [ 2952.757393] XFS (loop2): First 128 bytes of corrupted metadata buffer: 20:05:05 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0xc, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2952.786928] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2952.814096] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2952.835008] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 20:05:06 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x800000000000000, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2952.870879] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2952.904794] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 20:05:06 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x12, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2952.958865] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2952.999631] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2953.030951] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2953.052308] XFS (loop2): SB validate failed with error -117. [ 2953.064874] XFS (loop3): SB sanity check failed [ 2953.069861] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2953.090039] XFS (loop3): Unmount and run xfs_repair 20:05:06 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2953.098033] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2953.106915] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2953.125318] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2953.166704] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 20:05:06 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="78667380", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:06 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x1000000000000000, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:06 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x8, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2953.212603] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2953.228185] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2953.239035] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2953.254701] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2953.278789] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2953.288856] XFS (loop3): SB validate failed with error -117. 20:05:06 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:06 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x8000000, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:06 executing program 0: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:05:06 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x2, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440)={0x8, "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", 0x1000}, 0xfffffc41) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0x0, 0x4) 20:05:06 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x3, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:06 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x4, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:06 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x7, &(0x7f0000000280)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000140)={0x0, 0x7f}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={r2, 0x5}, &(0x7f0000000240)=0x8) pipe2(&(0x7f0000000040), 0x800) 20:05:06 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs(', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:06 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x2, 0x800) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f00000001c0)={0xfffffffffffffffa, "aa36c96d32dc95e77096f8d75aaf79cd8595741d3ccf03750691e8bf2ae7d086", 0x40, 0x401, 0x0, 0xc, 0x2}) 20:05:07 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0xb, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2953.873034] XFS (loop3): SB sanity check failed 20:05:07 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x80801, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f00000001c0)={0x8, 0x120, 0xfa00, {0x4, {0x5, 0x100, "fa097b9dbb9ae48497005ae56a040ac89f60e02273768fe24125e0aad4e2ca6c0e7ef81d766086f39692cc9cf03e3d7475310b84cb28c64a637bbdf77833f1121f8c6aace34d5f42e69cba0f076130c4024b29643aaf6217c2bcc211012ab5a73786ae232606c03f3b39fb17587d65deae3bd1730cf3384cb824882f2d2e3d58e87672fb338574c7c7e99d9d3691390e87e21b006680261ab514b90bf0de2e2a30baa675150c5b4396fd011c4d46e701109a6e5b1f5f1002cec89d7bc142b42c7a0e4591efc21d367a3fcb2b433349e9c1db4a8ea3e532df6e5047e1638de2fc7136bdb4536b66c6bd172d0b89388b625b87caddd82897bd1c4c98e8d9440d96", 0x1, 0x9, 0x64a, 0x2b82220e, 0x4, 0x1f}, r2}}, 0x128) [ 2953.898537] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2953.952261] XFS (loop3): Unmount and run xfs_repair [ 2954.017603] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2954.042253] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2954.054680] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2954.063056] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2954.071227] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2954.080680] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2954.088952] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2954.097325] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2954.105510] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2954.105542] XFS (loop3): SB validate failed with error -117. 20:05:07 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:07 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x200000000000000, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:07 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:07 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0xfffffffffffff000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2954.508517] XFS (loop2): SB sanity check failed [ 2954.513478] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2954.537687] XFS (loop2): Unmount and run xfs_repair [ 2954.546087] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2954.553738] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2954.562365] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2954.570726] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2954.579237] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2954.588548] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2954.597000] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2954.597038] XFS (loop3): SB sanity check failed [ 2954.605280] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2954.613499] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2954.618262] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2954.637776] XFS (loop2): SB validate failed with error -117. [ 2954.645227] XFS (loop3): Unmount and run xfs_repair [ 2954.654206] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2954.665012] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2954.676901] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2954.685761] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2954.694388] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2954.710585] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2954.730790] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2954.746918] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2954.756044] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2954.766833] XFS (loop3): SB validate failed with error -117. 20:05:08 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x689, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:08 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x11, r0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) 20:05:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0xfdffffff00000000, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") 20:05:08 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f0000000240)={0x3dab, 0x200}) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") ppoll(&(0x7f00000002c0)=[{r0, 0x20}], 0x1, &(0x7f0000000300), &(0x7f0000000340)={0x4}, 0x8) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) ioctl$SG_GET_NUM_WAITING(r1, 0x227d, &(0x7f0000000280)) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x9, r3, r2) 20:05:08 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x6, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x40, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000300)={0xffffffffffffffff}, 0x117, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000380)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x2, @empty, 0x1}, {0xa, 0x4e21, 0x1038d715, @mcast1, 0x70}, r2, 0x6}}, 0x48) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) r3 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0xe5, "33a218f4424d703b1fc5d17d02bbb4302dbc0ccdaf8e071de3fe47c2ba86ca524ed4cca9ba7b1946fd77370de39dbf6f10598e54e9c62462c9d7e1ef9a821e72993e4919008cb4f7769451f4002ae50bfc63ec1a9f0c77fb9866babf2c36624ea33eb54c1b7987fca740838fa7319b82f3ffee6c555f6dcacfb01118c99a94e2d9c38e1e77bf8f925597b653153b1bd26f003a8d5f19ee9ff8096aca40fa6b4d766086cc464bf7693281c122a7bdd866a287b0d763a2f3c346c932b8822883ca308f6b3924688dd7fd68113c6d0385d0bf645ebaef68b02c50bf439301bdf59e50fb8aef19"}, &(0x7f00000000c0)=0xed) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000140)={0x20, 0x8, 0x40, 0x1, r4}, 0x10) 20:05:08 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000280)='/dev/cec#\x00', 0x2, 0x2) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000140)={0xfffffffffffeffff, 0x135, 0x8, 0x6, 0x5}, 0x14) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000000c0)={0x6, [0x6, 0x7fffffff, 0x2, 0xfffffffffffffffc, 0x2169f29d, 0x6]}, 0x10) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000001c0)={0x24, 0x81, 0x3, 0x0, 0x0, [{r0, 0x0, 0x9}, {r0, 0x0, 0xfffffffffffffffd}, {r0, 0x0, 0x7}]}) 20:05:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x19ed3fca4b020000, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:08 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x700000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2955.108446] XFS (loop2): SB sanity check failed [ 2955.116498] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2955.142334] XFS (loop2): Unmount and run xfs_repair [ 2955.150671] XFS (loop2): First 128 bytes of corrupted metadata buffer: 20:05:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x4000000, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2955.196008] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2955.233121] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2955.259719] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2955.279448] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2955.296372] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2955.315000] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2955.329808] XFS (loop3): SB sanity check failed [ 2955.347529] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2955.363692] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2955.372001] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2955.380268] XFS (loop3): Unmount and run xfs_repair [ 2955.385506] XFS (loop2): SB validate failed with error -117. [ 2955.391767] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2955.399265] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2955.408235] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2955.417272] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2955.426144] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2955.434675] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2955.444882] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2955.465028] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2955.483659] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2955.499357] XFS (loop3): SB validate failed with error -117. 20:05:08 executing program 4: r0 = socket(0x50000000010, 0x2, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)='bpf\x00', 0x0, &(0x7f0000001300)={[{@mode={'mode'}}]}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x80000002) 20:05:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x855, 0x200000) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f00000000c0)={0x3, 0x3, 0x0, @remote, 'ip6_vti0\x00'}) 20:05:08 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x8000a0ffffffff, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x3f000000, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:08 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:08 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0xf0ffffffffffff, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:08 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="78667301", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:08 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x88caffff00000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$KVM_X86_SET_MCE(r1, 0x4040ae9e, &(0x7f00000000c0)={0x100000000000000, 0x14000, 0x7, 0x1, 0x3}) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:05:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x10, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:09 executing program 4: r0 = socket$inet(0x2, 0x6000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000040)={0x2, 0x404e23, @remote}, 0x10) 20:05:09 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000040)={0x7, 0xffffffff, 0x7, 0x7, 0x7}) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:05:09 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x3000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2955.902866] XFS (loop2): SB sanity check failed [ 2955.907762] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2955.930739] XFS (loop2): Unmount and run xfs_repair [ 2955.936225] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2955.943227] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ 20:05:09 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") socket$vsock_stream(0x28, 0x1, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000000040)='XFSB', 0x4}], 0x0, 0x0) [ 2955.993524] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2956.001695] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 20:05:09 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfsl', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:09 executing program 4: [ 2956.095620] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2956.106819] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2956.116321] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2956.129211] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2956.137892] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2956.184805] XFS (loop2): SB validate failed with error -117. [ 2956.300993] XFS (loop2): SB sanity check failed [ 2956.305942] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2956.317356] XFS (loop2): Unmount and run xfs_repair [ 2956.322447] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2956.329135] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2956.337629] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2956.345815] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2956.345826] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2956.345836] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2956.345845] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2956.345854] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2956.345867] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2956.395023] XFS (loop2): SB validate failed with error -117. 20:05:09 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:09 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x400000000000000, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:09 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0xfeffffff, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:09 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x4c0000, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000140)={0x9, 0x1, 0x1, r2}) 20:05:09 executing program 4: 20:05:09 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="78667303", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:09 executing program 4: 20:05:09 executing program 0: pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x803) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") write(r0, &(0x7f0000000200)="143e75fdb4795e09d8786db1b1c2428efa2d5c7ef6ac3e277c266871f50d7462dafeb7e61a6c2b7214c7f5f363cbf0d3b3f6964c7c85cf11b2c7b38e41693eb71963077a8e69faa64998accc46fa4cc1e033ed174b54278148a41b2356ec2636b7a58147d91fa5c0f2a649239f893dbab125af5b12bdbfc76d5408038bd0a7af02453dc53157d49be43c625c9e28303b1c6112eea95c5b0a53f88eb1135a74e0bc483c7cdc0dea4a4bc1f5af8d53082ceb0cf435966c0a758529a6d1fac7c67e3871fcdeedab267db54efffbe6a45c502a47482ee2d94550f80e283db88c4fd743", 0xe1) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:05:09 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0xd00, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:09 executing program 4: 20:05:09 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x400202, 0x2) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f00000000c0)={0x8, 0x401, 0x4e33}) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:05:09 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0xffffff7f00000000, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2956.705400] XFS (loop2): SB sanity check failed [ 2956.710278] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2956.778366] XFS (loop2): Unmount and run xfs_repair [ 2956.784114] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2956.790794] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2956.798986] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2956.807156] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2956.815376] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2956.823683] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2956.831865] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2956.840370] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2956.848784] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2956.857344] XFS (loop2): SB validate failed with error -117. 20:05:10 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:10 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0xe80, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:10 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x400000, 0x0) write$P9_ROPEN(r1, &(0x7f00000000c0)={0x18, 0x71, 0x1, {{0x1, 0x4, 0x3}, 0xfffffffffffffeff}}, 0x18) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:05:10 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:10 executing program 4: 20:05:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0xfdffffff, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:10 executing program 4: 20:05:10 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x8, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x400300, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:10 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x600, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e24, 0x7b, @local, 0x2}}, 0x9180, 0x6, 0xffff, 0x2, 0x1}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r2, 0x1, 0x4}, &(0x7f0000000280)=0xc) 20:05:10 executing program 4: [ 2957.120664] XFS (loop3): SB sanity check failed [ 2957.130215] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2957.182700] XFS (loop2): SB sanity check failed [ 2957.199017] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2957.209246] XFS (loop3): Unmount and run xfs_repair 20:05:10 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x543, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2957.240762] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2957.247582] XFS (loop2): Unmount and run xfs_repair [ 2957.247593] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2957.267840] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2957.276520] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2957.290694] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2957.322841] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2957.326537] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2957.351342] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2957.368416] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2957.388001] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2957.392026] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2957.396703] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2957.406900] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2957.412919] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2957.430059] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2957.437916] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2957.439618] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2957.454767] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2957.463282] XFS (loop2): SB validate failed with error -117. [ 2957.465939] XFS (loop3): SB validate failed with error -117. 20:05:10 executing program 4: 20:05:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x1000000, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:10 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x7, 0x101000) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x800, 0x0) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f00000000c0)) ioctl$UI_GET_SYSNAME(r2, 0x8040552c, &(0x7f0000000240)) [ 2957.616299] XFS (loop3): SB sanity check failed [ 2957.620999] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2957.651252] XFS (loop3): Unmount and run xfs_repair [ 2957.657120] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2957.678180] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2957.686872] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2957.695377] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2957.703860] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2957.711989] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2957.720184] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2957.728345] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2957.736599] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2957.744848] XFS (loop3): SB validate failed with error -117. 20:05:10 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:10 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0xb00000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:10 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:10 executing program 4: 20:05:10 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000040)={0x3, [0x3278000000000000, 0x401, 0x1]}, 0xa) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:05:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x80ffffff, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:11 executing program 4: 20:05:11 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x88a8ffff, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:11 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") recvmmsg(r0, &(0x7f00000017c0)=[{{&(0x7f00000001c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000014c0)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/138, 0x8a}, {&(0x7f0000000040)=""/63, 0x3f}, {&(0x7f0000001300)=""/228, 0xe4}, {&(0x7f0000001400)=""/190, 0xbe}], 0x5, 0x0, 0x0, 0x6}}, {{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/9, 0x9}, {&(0x7f00000015c0)=""/167, 0xa7}, {&(0x7f0000001680)=""/189, 0xbd}], 0x3, &(0x7f0000001740)=""/101, 0x65, 0x2}, 0x9}], 0x2, 0x40000040, &(0x7f0000001840)={0x0, 0x989680}) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000001880)={0x8, {{0x2, 0x4e21, @local}}}, 0x88) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:05:11 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x34000, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2957.976004] XFS (loop2): SB sanity check failed [ 2957.980770] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 20:05:11 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x14000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2958.033197] XFS (loop2): Unmount and run xfs_repair 20:05:11 executing program 4: [ 2958.058035] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2958.078897] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2958.092839] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2958.101229] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2958.110253] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2958.118827] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2958.127967] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2958.136895] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2958.146527] XFS (loop3): SB sanity check failed [ 2958.151402] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2958.162992] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2958.171302] XFS (loop3): Unmount and run xfs_repair [ 2958.171619] XFS (loop2): SB validate failed with error -117. [ 2958.176825] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2958.189474] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2958.225661] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2958.234100] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2958.242319] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2958.250475] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2958.259038] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2958.267241] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2958.267252] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2958.267281] XFS (loop3): SB validate failed with error -117. [ 2958.345435] XFS (loop2): SB sanity check failed [ 2958.350218] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2958.361740] XFS (loop2): Unmount and run xfs_repair [ 2958.367017] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2958.373820] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2958.381973] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2958.390220] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2958.398384] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2958.406551] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2958.414799] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2958.422977] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2958.431117] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2958.439385] XFS (loop2): SB validate failed with error -117. [ 2958.507548] XFS (loop3): SB sanity check failed [ 2958.512669] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2958.524312] XFS (loop3): Unmount and run xfs_repair [ 2958.529332] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2958.529344] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2958.529354] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2958.529368] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2958.583548] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2958.591708] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2958.599913] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2958.608107] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2958.616289] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2958.624547] XFS (loop3): SB validate failed with error -117. 20:05:11 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:11 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000500)="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") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1ff, &(0x7f0000000080), 0x80000, 0x0) 20:05:11 executing program 4: 20:05:11 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x8060000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:11 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x80ffffff00000000, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:11 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:11 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000180), 0x0, 0x0) 20:05:11 executing program 4: 20:05:11 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x6488, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:12 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x3f00000000000000, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2958.865553] XFS (loop3): SB sanity check failed [ 2958.870414] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2958.879198] XFS (loop2): SB sanity check failed [ 2958.895664] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 20:05:12 executing program 4: 20:05:12 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) [ 2958.918524] XFS (loop3): Unmount and run xfs_repair [ 2958.936945] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2958.956169] XFS (loop2): Unmount and run xfs_repair [ 2958.971941] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2958.978366] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2958.991700] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2959.018652] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2959.027879] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2959.043264] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2959.047273] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2959.051668] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2959.074479] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2959.084520] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2959.091026] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2959.103672] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2959.106417] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2959.124317] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2959.125979] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2959.139428] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2959.149488] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2959.154777] XFS (loop2): SB validate failed with error -117. [ 2959.164718] XFS (loop3): SB validate failed with error -117. [ 2959.298847] XFS (loop3): SB sanity check failed [ 2959.303700] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2959.315675] XFS (loop3): Unmount and run xfs_repair [ 2959.320704] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2959.327593] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2959.335781] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2959.344027] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2959.352268] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2959.360393] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2959.368557] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2959.376748] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2959.384914] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2959.393165] XFS (loop3): SB validate failed with error -117. 20:05:12 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:12 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x8035000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:12 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f00000001c0)) 20:05:12 executing program 4: 20:05:12 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0xffffff7f, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:12 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="78667302", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:12 executing program 4: 20:05:12 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0xa000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:12 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x1f, 0xff, 0x8, 0x2}]}, 0x10) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:05:12 executing program 0: ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) pipe(&(0x7f0000000200)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={&(0x7f00000001c0)='./file0\x00', r1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000780)={r0, 0x0, 0x0}, 0x18) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r2, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x307000, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000280)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x6}], 0x40803, 0x0) 20:05:12 executing program 4: 20:05:12 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0xffffff80, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2959.853429] XFS (loop3): SB sanity check failed [ 2959.861630] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2959.897941] XFS (loop3): Unmount and run xfs_repair [ 2959.905060] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2959.913920] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2959.923091] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2959.931245] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2959.939465] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2959.947645] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2959.955814] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2959.963979] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2959.972175] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2959.980347] XFS (loop3): SB validate failed with error -117. [ 2960.079032] XFS (loop3): SB sanity check failed [ 2960.084115] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2960.095326] XFS (loop3): Unmount and run xfs_repair [ 2960.100369] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2960.107266] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2960.116017] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2960.124237] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2960.132755] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2960.140930] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2960.149117] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2960.157363] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2960.165604] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2960.173780] XFS (loop3): SB validate failed with error -117. 20:05:13 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:13 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="78667301", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:13 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x300, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:13 executing program 4: 20:05:13 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") socketpair(0x9, 0xa, 0x3, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:05:13 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x40030000000000, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:13 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) name_to_handle_at(r0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="8c00000007000000d87ead6e4015cc22925021d38c5fa4260c7066fbee9787833e6d9ac943f9b34b622da3ff0ee4a56eb4c2f2ca4adf5ad0a7b0f817a8f20010d7cf9e5b6a0599ed5ec9e8e4cd685d9ccda822b04b2b2f83eef48b8bab0a458b2951d0c5e90e9b410fdf1e83958c340b9c2f20faa2afebb96b09892972fcdbfacc7a02c37f"], 0x0, 0x400) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x4, 0x1}, 0x0, &(0x7f0000000140)={0x1b4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4}, &(0x7f0000000100)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, 0x0) geteuid() geteuid() syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 20:05:13 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x5c00, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:13 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x200000000000000, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:13 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x20, 0x10000) ioctl$VIDIOC_G_AUDOUT(r1, 0x80345631, &(0x7f00000000c0)) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:05:13 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x608, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:13 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x800, 0x0) [ 2960.550184] XFS (loop3): SB sanity check failed [ 2960.561793] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2960.621279] XFS (loop3): Unmount and run xfs_repair [ 2960.634737] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2960.677391] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2960.698706] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2960.707499] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2960.716093] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2960.724518] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2960.733456] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2960.741812] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2960.750338] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2960.758788] XFS (loop3): SB validate failed with error -117. 20:05:14 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="786673dc", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:14 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x600000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:14 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="786673ea", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:14 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x10000000, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r3, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f00000001c0)={@mcast1, 0x8, 0x1, 0x4000000, 0x9, 0x7, 0xfffffffffffffffb, 0x3ff}, &(0x7f0000000200)=0x20) r4 = syz_open_dev$adsp(&(0x7f00000005c0)='/dev/adsp#\x00', 0x5, 0x20000) getsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f0000000600)={@multicast1}, &(0x7f0000000640)=0x8) r5 = fcntl$dupfd(r3, 0x406, r0) r6 = accept$inet(r5, &(0x7f0000000480)={0x2, 0x0, @remote}, &(0x7f00000004c0)=0x192) accept4$inet(r5, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x10, 0x80800) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000500)={0x8f, @local, 0x4e22, 0x0, 'sed\x00', 0x2f, 0x3, 0x36}, 0x2c) r7 = gettid() r8 = syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x10001, 0x2003) setsockopt$inet6_tcp_TCP_REPAIR(r8, 0x6, 0x13, &(0x7f00000002c0)=0x1, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffff9c, 0x1, 0x1a, &(0x7f00000006c0)={0x4, &(0x7f0000000680)=[{0x100, 0x5, 0x79f1, 0x9}, {0xffff, 0x8, 0x8001, 0x101}, {0x1c, 0x3, 0x1, 0x7fffffff}, {0x5, 0x7f, 0x9, 0x1f}]}, 0x10) ioctl$EVIOCGSW(r8, 0x8040451b, &(0x7f0000000340)=""/77) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup(r8, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) write$FUSE_CREATE_OPEN(r8, &(0x7f00000003c0)={0xa0, 0xffffffffffffffda, 0x7, {{0x0, 0x1, 0x5, 0x1f, 0x8, 0x80000000, {0x5, 0x20, 0x9, 0x4, 0x9, 0xcf73, 0x80, 0x1a5b, 0x3, 0x7ff, 0x8, r1, r2, 0x3, 0x1ff}}, {0x0, 0x4}}}, 0xa0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000300)='reno\x00', 0x5) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000040)=r7) 20:05:14 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x8864000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:14 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) name_to_handle_at(r0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="8c00000007000000d87ead6e4015cc22925021d38c5fa4260c7066fbee9787833e6d9ac943f9b34b622da3ff0ee4a56eb4c2f2ca4adf5ad0a7b0f817a8f20010d7cf9e5b6a0599ed5ec9e8e4cd685d9ccda822b04b2b2f83eef48b8bab0a458b2951d0c5e90e9b410fdf1e83958c340b9c2f20faa2afebb96b09892972fcdbfacc7a02c37f"], 0x0, 0x400) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x4, 0x1}, 0x0, &(0x7f0000000140)={0x1b4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4}, &(0x7f0000000100)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, 0x0) geteuid() geteuid() syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 20:05:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14, 0x80800) fstat(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@remote, @in6=@remote, 0x4e21, 0x1bb, 0x4e21, 0x0, 0xa, 0x80, 0x20, 0x2b, r1, r2}, {0x9, 0x8, 0x3, 0x2, 0x1, 0x5, 0x6, 0x6}, {0x7, 0xff, 0x8, 0x9a}, 0xff, 0x6e6bb0, 0x1, 0x0, 0x0, 0x3}, {{@in6=@dev={0xfe, 0x80, [], 0x1d}, 0x4d2, 0x6c}, 0xa, @in6=@local, 0x34ff, 0x5, 0x3, 0x1f, 0x4, 0xfff, 0x1f}}, 0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r3, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x10, &(0x7f0000000200)={&(0x7f00000001c0)=""/59, 0x3b, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000500)={r4, 0x10, &(0x7f00000004c0)={&(0x7f00000003c0)=""/185, 0xb9, r5}}, 0x10) 20:05:14 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x8100000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:14 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="786673b4", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:14 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0xffffff7f, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:14 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:14 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:05:14 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x40000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:14 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="7866731a", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:14 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x24bca3fed19, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:14 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x6000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:14 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f00000001c0)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$key(0xf, 0x3, 0x2) r3 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x400) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000300)={0x0, 0x73, "50bf8177f24966a2a27042befeeb94d492e3f529eddf6d18f2c60a6209fbff43fa2fc1054a6ebb8fdde08f7abf562ab61786bad3c4f86a8efb04d0ab19471931ab394a698c7c2cb2e0d181bb0fb536dd4f7a9c251d897c8902cfa6b93ea616ec4bb386ce4d6e003a12f2f863ac8c61d1af07ab"}, &(0x7f0000000380)=0x7b) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f00000003c0)={r4, 0x67, "e78ed724540b65d7d0c32be6ad5e57b6706516bf73dc5fe34272ab75755ddbfcda6e7e9dc791605321a334cbb3be35c80d8ddb3ad6e26ea58d95272af9d235991abbb976f3acc0b331ac99e1b15eecae9d218f0e1293a14ad2506a7c756d0e6bf4100c837bcc94"}, &(0x7f0000000440)=0x6f) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000200)=@assoc_value={0x0, 0xffffffffffff0001}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000280)={r5, 0x8}, &(0x7f00000002c0)=0x8) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f00000000c0)={0x17a, 0x0, 0x1, 0xbcd}) ioctl$DRM_IOCTL_AGP_BIND(r3, 0x40106436, &(0x7f0000000140)={r6}) [ 2961.604484] XFS (loop3): SB sanity check failed [ 2961.613741] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2961.656231] XFS (loop3): Unmount and run xfs_repair [ 2961.661312] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2961.680998] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2961.700819] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2961.737741] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2961.778727] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2961.787671] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2961.796135] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2961.804350] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2961.817770] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2961.830894] XFS (loop3): SB validate failed with error -117. [ 2961.904785] XFS (loop3): SB sanity check failed [ 2961.909485] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2961.921594] XFS (loop3): Unmount and run xfs_repair [ 2961.928317] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2961.935337] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2961.944482] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2961.957000] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2961.966441] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2961.975477] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2961.984052] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2961.992512] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2962.000661] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2962.008938] XFS (loop3): SB validate failed with error -117. 20:05:15 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000c80)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) renameat(r1, &(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", r1, &(0x7f0000000000)='./file0\x00') 20:05:15 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0xf0ffff, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:15 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x100000000000000, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:15 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:15 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x80, 0x0) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000000240)) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000300)={0x20, {{0x2, 0x4e24, @loopback}}}, 0x88) r2 = accept4(r0, 0x0, &(0x7f0000000040), 0x80800) socket$netlink(0x10, 0x3, 0x1f) getsockname$unix(r2, &(0x7f00000001c0), &(0x7f00000000c0)=0x6e) fsetxattr$security_selinux(r1, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:random_device_t:s0\x00', 0x25, 0x1) 20:05:15 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:15 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x8906, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:15 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x44082, 0x0) sendmsg$kcm(r1, &(0x7f00000019c0)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000000c0)="8c2532e841188e", 0x7}, {&(0x7f00000001c0)="387a32c5ce191a4a80b685d2ec69e7aa060aab4aeb26ee388ffa0b0a6bd2ce1af4d640153759332877fb297a6c3a0e2b90fd3d66819770ada657e6c49dff79538d33", 0x42}, {&(0x7f0000000140)="73f4640c98efc191d289676f778e8d0c5a8c2de8969d72726da438230a392ac74f981bb2a2cf139f4d2895", 0x2b}, {&(0x7f0000000240)="4bb21be07a4b00e1fade96fdf4a48cb3c32fe8f3f11d806a41eb88070590ba228a313a6f220c7b35e68442cdd846bd814811d5b47d92a177261df0b6e8a6139807a5b729428406d2cadc3d81ec88fea2952f5c9c6fd770becfe952dc0425de8d9f0e3e8b9961cdee229d3ba8eb7bd598b59dc6047bc7e5c2afbbb12ae11197ea18a6cfbf60ebfc9e9ca4681eb751da2eecf31ce71ca0f13f6ccfa54d2215fd729c54c91eebf699fe9e0398a331149386d7fdcbf770f39eaf41e8bb4d6a401260bc9e3929dae2b5a23f67b7ee95f9de6b3da19489681153e347954c0624cce726fd4eb94a19b918fdc79155fd7014cdcf45fd71704ca1c5f681b4e41919ae81e5360536ce35e2430323354282f3498077f5593ff71b512e6e878874be28ed76c14cddeba169e4ca401e739722e8b7efa6d12853ca7d349f1d80b8d4ac494eb3cced3c22e138f95e36365f2c6acd65fcd99bfc2ab2eeabba53dd1383a876cde4155fc4992b75aaace6120043a5755c719e01566f62cadcf6eecb23f809f1f72fbbbcdfc5e4aa4998121f9245444198ff3ef6f6a05313901b28814318b0578e3cdefe785e03bae2fe44356d5aa9ab42fc0d787895f6c5f884c4e9866d9c8580638eaa6a35d4de460f84cf89d3a3f875eaa03db6f5c21b7c7f16102e5d037d552a41aa452db9bb51526b720efd8f3f9efeadf5166804cad03eeaea317800047abf18ba6becaaff47accf625482ff0df0ee961d8f385e45310cbd6f5d446d12f086e6f98cc9ec9e7237f20b8601c84b5b83ddedbfd24fae01d48bd2f0fdfe9260467cb32bb580b214d21290ed5c0dd05488dd933dd53d93dbc872d68488c22b1092488cb6dda5feee8cb5317410774c0280a74547b88a49f615eed19b0749362f7ffcd03bc5916f4612dc720df1d14faf7978cd919443764cc0bf2f0f482eeb553106e4ae20e3d71a63e504bfc404385530d10e5b14cdda2aa1cd2d87495fcf89d09c1cb7032e5793e6a762252e59185b18182c716eb19cc309bf4080b4b4b48f6002470c7556ad171b1bba784d155558831635c72d4a59ad90bf3a185b20a43c119a02bf3454fa64cedced82d4aa159801971586635c9d9ef7eeb71ea2ed3f2050ab3557b81241fbd34b25274bd967f15cc4878d1632fdf1567f88588d25943382802ba609ec08c6ff9c1d28ee6d1360308b7a249c0222770b53c6740676bb513abee2c90b0b20d7deeca818077c0bab8788a1cbaef8f62d5d133da5333865c3c3cc8530e9216f1337336168bdef0125d65124230543c60f64929447ba3b1f037b67b5ef73cc3dd482f71f5c7a1593e72fcc030e610e8e926e40f988673ad21d6b9096a7878a788710b3ce712dbebc4128d1f28b19ce0b4e82b2ca5b2e20504816d5f7f25519fb35d5285186c5f64db4ce57f9e76089e6c9409c5ed329a4a49136828e93cae72c57f1c62c95c20762a14a891397b5fa4c7e29b8635a1f5a2a7827ac024b5b42a3ad23c6778bc19a632ac18e612b19d48fc012e37a832ac92e9233070ab546d184505cc88e86e8ccc493e0779694abd4bc47b1e9cd9628f3e8d278eaf666cf9b49ce476da849731467aae8574d1b28513c2c954e49ec86196d929280156ab84c6b2e1f689a3e6e7f94e8a0b08b58809823439f09245e67505047a2897cd9a4b8589821f480f1558a8fa8e10fa48a2c07a70647587ca81ea625262fbb83e0b45ffc1a479fb509ffb43d52c4b0d74e31d1808d75e14ed5ba63ee3c3df90db81d88141d2af5c0bc2c7ecfcac0e3678c36cb65bcf4053899b4b04c7ebbb20619cb37a349af445b23d762fad56344dda361a512ce251f4d76f59191323d664116c60d8e33268bdd92b337b64391531d71fdf705ac6d63472b3f7629c42d089ad681c6ecaadbcc5cc8997f21b2a868ce37ffa07f151097e1eaa68c09d52ee337cbe8a5398b249e6ca2403e8bea6a8e715ac36d3a41bcfe8b4a37b335b8551dae062e694d1078ba7595c6ee0ac9561a0e2b9db53dc2aea8c1286402b21668cb579544895f22e0bd3212cc7ab080d21cae18dbc63063ece769866811dcc966c4d9af954cde86f2ef7183242952adaed18731d9aa8c592e8545e8426577011f4ae1c070a0e4b7c1d64a0cc5bb89c48d621c12fbe39779afbf3d7af74c814b3175d2db5874a0e7b31461b2af47987c4bbec0672859ca128aa8ccc25ea97f6565faec652dd92c2381f3907a35b1d3b90430f15ae4d15b10e5f0e60bb3047fcc188946728af92cdbd5bee90c218d2af71b26f0fb5f67902c463aa0866c3e11583436fb991f2cf771db3c2da3f1092e535f417aedc53424624487f98bfd6bb6b2966cdacc9c661a5d07348a4de49bddf646b749c7dabd295ff4f23ea05ef5803dd060cf54fd21069a8a3d2fa9f52996938efe60036a01d0100bae545b06b54d296bc9837db4259577d19431dc9bd0bbc421b3df0100d27873d43cdcf89c91bce42ec43c3f7d45d9acc2c9c4b367d64d18b2aba2615893e484c1e635b15c15022b4d0a3cc1cb537cb86d2fb1920586f4625ad600ffe2ff7ae8402fbc8058d56ec737ce9f74c7247412b140b2cc769bfc44163d481e36ad67a104d0c84bde23ed10b311e80fe3f9ee8606a6ac128a82ce40b07f157d3eefb521e10d589dbd6e0be5aa2140bb3203b13f71a15d77e86713759d12da5c3f31fa1d9028b22235823c6cb9a15740fa53674aed211aacc3b3ae4806b3ddd8c3a21387c14f60c9c30e5f0affe18dca8ec668052c51bad72080a728a69f98cff57d3616316c27d636feffc476c6c948a8a48df4ae7750959991a0b7b7dc2347eaef6651765cde6990d08811e2cfba0e6b4ee3f02e4ad1a3e6a75b13ff3cefd9f5ba07875584f129b61aedb5e40a40e7ebb7b5c542f3f9022c0c96d548fb221887fcb769a0d6b619a4e1505a273485964cc1866dd8b2b3e1aaab821c98bfff781f547ea397f728f431ee9c1b8ef8feb9bf1b6528784fdd8e0667e77a73cf24e4f37b729e454321a35f0bcd00b6835a6df1dfd7693543c008e555ea56a46a896815fd163ce83e64bc2168cc796f897807366b547c1021a3e7d3083c419cabfc3c1156634d3bd42dcdb14380c7d14c2667d1ef7ee846aa5b8157ed067b31efdced311ff3ae3fccd7271532d9dc5fa139b7fcecee11535f0f19e064515f06f1b38f7dcc06d17ca7024e005043362492a8bfad044d6e8600aac2046dc6cfc82b9794cb95add7e36ceb309867e52b74cf91edfbfc5592c5852ee6524cad7cb4440dabe8bbc8c073964effb87935029ecc78d73d1c7388fdd2b351ea5fa6710e07368668c5355aa9b4aa4f72668fb1e0d4fe7dbdf901416c5bab90cb7f064fc63159574ca39f260eae013aa409933484af90f0376f34e0cef7d6262a536e28d6b6823d6d6cc71799f2c319dd531c222543df508d890fc87c9b0adb571eace3b7b8a8aeb59d0d594dd96c820bc118ef5285badf35ffdd6af4e7e7b74f80833047e7c9655786105ff69e4818ef62d3b09c71ab0ff1e35f64509d44c08e29a776ef39fe78e9f70a7e3a0681449c1cd10a005d31aee2e516f4f29654c601af984aea016a6b62c08c0ebde6ca6dd06377c5b155f5265b339ad9299d440bb03f908bcb0c9f866a311286feec5c65e5511124427d8db54f75b07638c42be7905830eddec21362c7a46eeae5dc3b432273708940c815a1d44cb663a57a5891f7cd798fedd0aef338c58157c65e8562aab834eb590718440f0168e11a08b02d473adfdc30a7c718ecefd8d5b784117a087aae955c5c4ccffef3d9a0ca4cd36dc46070b5e124bbffa50c2ca7bfa5903cc9f43a3bdbb57167c91bc685a92a6773eaf23c8bbf7769ad5ba79d23ad158b46c31d8039b4a155bb442eef46a3b6a62e6ddab9771b26dac00c071f47a2b45a66285ba31600674135e33e731aa0deee554cd95d6eb5fc9a4205463352c82063050982766a9610693b5be0a9d2b91967225bd6dea8b58d4327454ee2daa600c55a3d8a1cf02d04c49b73584366e50d053cca36b01715f50c0a8256462c1e3b122b38d48e54808682c1671413f4eb8f9e3fb1e84238b5d85de037822499d090aaf0f9ddf9ed5e7ebda9ef8d5746dcf445d7ae5835e82f66b30100d7c2dc77680769a67d3c7ea8a87f05356077d6a76ad6fbdaafebbc9c92e3b594344e8255749c46d45411518adfa279f8a64e99036b355bbbd043006d350dbe0a6942d534aa640b7d7d27c13b5067a11d90886c1a843cb699314657ef37dfc2270c46883966d084828afcdebafa76684a1ccf9be2ad90b184d43e5acea816f7d2f197c1f40c60f91665c8b0f370dccf42e2b02739b0d8b3868cb2bd526076c0c26c3f9f71013257842e877b1a619d350ba4b23378eac05383e4010b292c7dad927dd77e6c6752a2589b40b17547a3efef984b39c2720114dad11e7956eaf2e482f322d1dab6fd6fa328aef48eabfeb814d25c4d37149c5b308968c5fafd0528db02145632385a2a29c07d7766bc1b0376b04dfba0a35097c1d76a1b40bc0b47aaa34a5db2e3aef86e4a382c85b133b7014a98f4fcad0693144de3fe2138d3da3f7afd14f788cde014f0bb9d08857a1cc0734b5cdde4d7ab465c5a586902685490f6653ff02bff443048c7a2b33c06deb600ac10d50cd495e4f340dd0376fa1b7576c48f4072ea59a6be101910400fdf12997641eb5b7f4aec53f188285d1d3877e0055e3cc5f69bd107c6675fa71cbaefb2b3e3561830a0313ea6a2a1f521aa3d2aeb55e8d250e9ae27fb02736b6161eb0698775c5abc9f7bb609f6ad0f8aa83522ea145a26780a96513bb589bf264ec42bc5dbeb42d8584681d16481d2d24306f7ac024efc6ed9e54c7995cabe9878811f68fa6438742460d9d7936c73c79d5abddc6c36b2ce886b502ceaa2c37d725bbd9736ec51225fe1b183ed04e2926b3a25e36885a79dff700e3a427ddfe1c36896c0d9093c5f7c3949d8eb03bb867af3824fc3c5e44e7e2883db0301e9089eb408cc0daac726d9f41b04643496f19a12058201857153a8e9f644cabda6f0f3c1c30fc7fa76cea62aeabf7d4f1dfe1a49546faaeb5067fdc814142cd890fe3bc8ff4c1fe2797b90cd175eb69e3e6a43c7353bec49279cb22b2e1d609d185e6bc70dc6ce027884d5beed82c9aa8962345283c78c84bd53d3044467fd668adecc8be64924c432dafe97480e8d160080e9bb04cb37dd1d9a5d87cdfdebc51f08dee7b92a25ed0e50f2bee658a3c2476b2bf5599dd561b6dbcdc0a18b4dda1062b636a5f79fde37c6a9598ac982d595a7ff667d8e72ece9c1c58890a51298029aa73d96721b7d2102ce89d9d3343f8308bdc67cedf3126366883cb6c03fa81fbffd2b417eef66157c0f55939e1bbf0c30b241fe657ff058bf95242d488a16684ef2e4aafa7fae8b0568f6cdf5660290802f6dbfd8074fc856e296e687c703c93abe8e94b04c8fc3fcad59236c7e2e41e48f312e3f3d4be2bdacd894b912f2a41c2144734510f91ebc81a56b0b20d79734d3e28b9c0741edd22b93ce079309ba6975cec9c4b3e704073f27f5cc8f5a84c256ad904486eabaceab055eaf6d3532ba6f9b6ee7214f0dbecc9b2d6f9fe0e7c94508d30f12f83df8fe1ab9e8cc0e23a856328dd0fa2f1e555684c997385c64b998d921b951c556425cfa953f5342fce36c2b2c5979b4c442074759f427e46b45a19eea98c017ecfbe81a026f9df3d8fb89dc2f77512c8788c662144a2db36fbd19ba07adb4a2359ee760817e40df3c", 0x1000}, {&(0x7f0000001240)="d93452d013b8a047a81a4c6ca8d38817c8137f264c8b7576310f7246e454e9c62e99e143af44902b6fd18b8389432e40de587531dd41253134266d6737df9897fe3be90471bcb2c8ddf8eea9e33e2f26c775ca814dc7a677ea36c8c6c88bf697f252977d1093fc16524c56b107d5b2c9", 0x70}, {&(0x7f00000012c0)="044f01d0533b21a52059bf8a56fab027ff664b9bc364144eac9f7582a4d65b3148ebc0e9fab88e0db73f539052cfa2118b7d12b6eb9c8393557158fbd9fa1955b782f1599aecc7fec23b31447e23467d849f55daa509235553c3e59f71f66336974f21c9d54544ba46ec492d5bc90f85cf68deb9cf73a531e45e04f1e27a04d80707554867ed61243e1526f4beb2a68cec68dff872290453d5873ce509ff4b213c91d84031ecbab34f0750101f8ae390", 0xb0}, {&(0x7f0000001380)="144f49664ff64ea21a66b321ab45a9388147ecaf7aab43876f70", 0x1a}], 0x7, &(0x7f0000001440)=[{0xa8, 0x85, 0x80, "fc7d2c42c407e0df10680e57f8d523d92046245687b5bd746c50385947f8f8b56ff9a260d4f229e29e1a4f1febc564477a8a037300fd5bf3c0ba50e704e8f0b89537fc09bd13242f7d7706f2c8c0baf6eae75450056c655505d966a4eb12361befd6e4fe5da8a684f2308c4ebee626c49eae0159bec2194f667c21828491ded5c3aa3138524b5b38557758870e32800d5917b244561bbd"}, {0xd8, 0x0, 0xfffffffffffff66c, "c766f973b73fb4558db5367eb37433f65d5dd911ff26be89f7ae001678036ce32fc4d98eb17d474fb9f46711637900e57e99209a25149f1f95a9eefbb74afb7c9c113516bee75927f1d87e49dd044d32cd709b95911a62ea685c42761e736ff42a954d1937103021f8235afacc4f4e3ffa654e89fa5dd4b72b81ecebeca06d71e1fc2bee83df971dad31be264e513c52a4641e99b4299ed9631906429ff0bbe1b5252e90192d2187c79d7feef47e3b6ec56fdb01286b20e931f8e7816bb468a117abe3"}, {0x108, 0x10c, 0x5000000000000000, "9259bff9d149e1942471b063384eb2515a8f1655700c9c7a410fe8d886eaa99884ed0ec04ca323f7fd90d757688b609d0440167685529b64f5a08421a37c6785d67e5296f64b9526ad888e3198092bb6e8b7f7c5d9fde9f9ba3c2c245cf6880c38096ae3b107d00a3458655d7499104f07486f65dfe05b8c69c204b80a3d1a635b56e0a9bcefcbb72be2bbf84db60c548715d889f7b65877115d1bf41daa60d8d32307771e8be6b75ede2c5946ed8be0183b963b43aeacdc073ca076ce7d41968bf54c7454d3d5e6bfc7977248fa96e68b25ab0b482ed5e160d289c5105f7c69ce4cdefee0fea7b971e8357c6c21c0ff75a64fec"}, {0xb0, 0x11b, 0x5, "c427e8262896192211e728e7bb3c5d142068cc5a88b82bed3cc1b24eb582d60fc1f3a16332c87d0f82f467aba81d8b375395ecb8b786c13ebddb660a6a951c4febf787772cbc74f8877bc52e7c0345c6829a530cd34c2ddf9a62e97801065e41fa806d8b9912efce8e2fda589441bf5a0a8fdf3db566bf7526de676bc43fb54905826bbebcc36f941301e1ca54c998e87144596c62616f6c80ad69b26127d7af"}, {0xb0, 0x109, 0xd15, "adb1b9f465db9fabc5ef8fd246d3097938d5bb50e3cd4185f63758c1caf9dda8c10c0a5cadfac6bf3e117577952d645626bb3d25aa183d3ea249a8398053a6fe1c66160e1020a0dccce302cbba60bb64c42f49493eeeef9aac3fbea83501ebec82c3a32f37e2d519e54fe56a5f638c8d0555f087b2f9cce660cb581ba91d76d87d459c043049bb3ee221bcfb4bf0b9d786a945f7583dc7e49f39f276a6"}, {0x110, 0x197, 0x100000000, "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"}, {0x70, 0x0, 0x3f, "e612d84050ff3a773be47463c95b4b89f4f77371477de825c13d443a73fb6666385e7fd8f445f0811bcee0d15be6f28be1f869ba44f6d64a8c263ccf4c3d9e89b0ff6ce1a4c8b8d6ee67c1c7536362b1427fd1a4c52e287394db"}], 0x568, 0x40000}, 0xc040) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f0000001a00)={0x4, 0x5, 0x6, 0x6, 0x3}) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:05:15 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x80ffffff00000000, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:15 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000006c40)=ANY=[@ANYBLOB="00ef00c100000000000000"], 0xb) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, 0x0) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, 0x0, 0x0) ioctl$KDSETLED(r1, 0x4b32, 0x8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getresgid(&(0x7f0000000280), &(0x7f0000000500), 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) getgid() fstat(0xffffffffffffffff, &(0x7f00000008c0)) pause() fstat(r1, &(0x7f0000000940)) getgroups(0x3, &(0x7f00000000c0)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) creat(&(0x7f0000000400)='./file0\x00', 0x2) [ 2962.365784] XFS (loop2): SB sanity check failed [ 2962.382303] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2962.382783] XFS (loop3): SB sanity check failed 20:05:15 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x800e, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2962.417028] XFS (loop2): Unmount and run xfs_repair [ 2962.423041] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2962.445443] XFS (loop2): First 128 bytes of corrupted metadata buffer: 20:05:15 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") r1 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x1, 0x2) sendmsg$nl_route(r1, &(0x7f00000022c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1001}, 0xc, &(0x7f0000002280)={&(0x7f0000002240)=@ipmr_getroute={0x1c, 0x1a, 0x120, 0x70bd26, 0x25dfdbfd, {0x80, 0x80, 0x14, 0x50, 0xfd, 0x4, 0xff, 0xf, 0x2400}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4004080) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f00000001c0)={0x0, 0x0, 0x2080}) [ 2962.471781] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2962.473492] XFS (loop3): Unmount and run xfs_repair [ 2962.491051] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2962.503074] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2962.511526] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2962.515268] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2962.530726] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2962.560240] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 20:05:15 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x8000000, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:15 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x700, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2962.561151] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2962.621687] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2962.649524] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2962.655122] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 20:05:15 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm-control\x00', 0x80000, 0x0) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000340)=""/20) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000380)={0xfffffffffffffffe, 0x6, 0xbe, 0x400}, 0x10) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000180), 0x0, 0x0) r2 = dup3(r0, r0, 0x80000) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f0000000040)={0x0, 0x1, 0x9}) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f0000000240)={@sco={0x1f, {0xd97, 0x81, 0x2a6f707d, 0x0, 0x4f1, 0x40}}, {&(0x7f0000000140)=""/220, 0xdc}, &(0x7f00000000c0), 0x42}, 0xa0) [ 2962.673186] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2962.688730] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2962.697618] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 2962.706936] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2962.716148] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2962.717532] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2962.727816] FAT-fs (loop4): Filesystem has been set read-only [ 2962.739145] XFS (loop3): SB validate failed with error -117. [ 2962.758675] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 2962.760432] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2962.776394] XFS (loop2): SB validate failed with error -117. [ 2962.796295] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) [ 2962.814670] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) 20:05:16 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="7866737f", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:16 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:16 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0xc0b1a00744ba7a3e, 0x0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000380)=""/91) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) r2 = creat(&(0x7f0000000340)='./file0\x00', 0x4a) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r2, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB="b9fa8477", @ANYRES16=r3, @ANYBLOB="020426bd7000ffdbdf251100000008000500be16eb7b5c0003000800010001000000140002007665746830000000000000000000000008000800070000000800080000000000140002006970366772657461703000000000000008000300040000000800010002000000080008007f0000002400030008000500ffffffff080007004e2200000800080006000000080007004e200000080005007f00000008000500435d000014000100080001000a0000000800090014000000"], 0xc0}, 0x1, 0x0, 0x0, 0x8010}, 0x1) 20:05:16 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0xfdffffff00000000, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:16 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="78667380", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:16 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0xfffffffe, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2963.355804] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 0) 20:05:16 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/ip6_mr_cache\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002880)=[{{&(0x7f0000000e80)=@in6={0xa, 0x0, 0x0, @local}, 0x80, 0x0}}], 0x1, 0x4000041) preadv(r0, &(0x7f00000017c0), 0x1b1, 0x0) 20:05:16 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)=0x0) getpriority(0x3, r1) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x800400, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r2, 0x40086610, &(0x7f0000000140)=0x8) 20:05:16 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0xffffff7f00000000, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:16 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x1400000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:16 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:16 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) [ 2963.433973] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 2963.454526] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 0) 20:05:16 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x7000000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:16 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000040)="7000000000000000000000a491b1b104a4c9a4464be2594a6148c445a845eb1e20c99c794e886a135061") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 20:05:16 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x64b, 0x200) setsockopt$packet_int(r1, 0x107, 0x1f, &(0x7f00000000c0)=0x9d, 0x4) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:05:16 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0xfdffffff, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2963.694676] XFS (loop2): SB sanity check failed [ 2963.700990] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 20:05:16 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) r1 = socket(0xe, 0x803, 0xfffffffffffffffe) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) 20:05:16 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x88480000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2963.754208] XFS (loop3): SB sanity check failed [ 2963.764031] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2963.765300] XFS (loop2): Unmount and run xfs_repair [ 2963.789804] XFS (loop3): Unmount and run xfs_repair [ 2963.809244] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2963.820854] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2963.827969] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2963.868452] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2963.872216] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ 20:05:17 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/ip6_mr_cache\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002880)=[{{&(0x7f0000000e80)=@in6={0xa, 0x0, 0x0, @local}, 0x80, 0x0}}], 0x1, 0x4000041) preadv(r0, &(0x7f00000017c0), 0x1b1, 0x0) 20:05:17 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x2000000, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2963.908769] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2963.917214] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2963.935992] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2963.945426] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ 20:05:17 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x1400, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2963.960528] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2963.963802] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2963.979304] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2964.002496] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 20:05:17 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40, 0x0) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f00000002c0)={0x5000, 0x7, 0xffffffff, 0x1, 0xd0}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='veth0_to_bond\x00', 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000300)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000340)=0x1c) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000380)={r2, 0x3, 0x20}, 0xc) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000180)=""/199, &(0x7f0000000280)=0xc7) [ 2964.011874] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2964.020597] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2964.022273] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2964.040357] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2964.051113] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2964.059503] XFS (loop2): SB validate failed with error -117. [ 2964.065645] XFS (loop3): SB validate failed with error -117. 20:05:17 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:17 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0xffffff80, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:17 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x7, 0x12280) write$P9_RCREATE(r1, &(0x7f00000000c0)={0x18, 0x73, 0x1, {{0x22, 0x3}, 0x4}}, 0x18) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:05:17 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1283) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) 20:05:17 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0xa00, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:17 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="78667302", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:17 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x3580, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:17 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000000c0)) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000240)={'nat\x00'}, &(0x7f0000000140)=0x78) ioctl(r0, 0x2000000000890e, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0xffffffff, 0x2e, &(0x7f0000000180)=[{&(0x7f00000001c0)="4c647c898039a6f2bcce1ce5b6c89f864dbec1e11def3ad32f8661c19f41f5846cbdb32760f8ca8c4de464f8a43404da91eef92789131a285fc3d8c4f047a4f79528e3bcf98d753527202f45e5326e6c5a8f3ab9e822a543ebfddc9978a9d269e293e5fb518aa76382151938a9c43fcad641d6e3", 0xfffffffffffffd1c}], 0x0, 0x0) r2 = dup(r0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x100000001, 0x80000001, 0x0, 0x7}) 20:05:17 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0xfffffffd, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:17 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x300000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:17 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="786673d0", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) [ 2964.602875] XFS (loop2): SB sanity check failed [ 2964.609267] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 20:05:17 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfsF', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) [ 2964.659956] XFS (loop2): Unmount and run xfs_repair [ 2964.671131] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2964.686176] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2964.712280] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2964.720689] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2964.744093] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2964.781838] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2964.804750] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2964.822347] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2964.830678] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2964.847556] XFS (loop2): SB validate failed with error -117. 20:05:18 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:18 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x1000000000000000, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:18 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x86ddffff, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:18 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1283) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) 20:05:18 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000000c0)="0a5c3d0240316208007070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:05:18 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:18 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x4000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:18 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x80ffffff, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:18 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getgroups(0x2, &(0x7f0000000040)=[0xee01, 0xee00]) getegid() setregid(r1, r1) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) 20:05:18 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x70, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2965.307681] XFS (loop2): SB sanity check failed [ 2965.313960] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 20:05:18 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x8, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2965.375198] XFS (loop2): Unmount and run xfs_repair [ 2965.401321] XFS (loop3): SB sanity check failed [ 2965.409214] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2965.432198] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2965.438947] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ 20:05:18 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="c31a75d4f2582fbf77dc5a6adfc2f38d596eaebc06a76b5a55b3b9cd1832de3630858f0aadd984c772b5677d31a68c60503fcf3903d673f1828d6cae9444003fb9f7878cb7f60d4a1fa73c86b52b7f8ba580b808860ab2d4162680cba42fe67da86b70a0c98b9dcad784f82144d0dca9cf62fceb9ed5dbb2cfcae66e2b7ca2e1aa3653f83d28674e7eda94c7618c557a6b25b86d233756d55ac0a91dad533aadcd43739543d1621182576aad59d82c197ee75001dca6982bf27b38", 0xbb, 0x800, &(0x7f0000000140)={0xa, 0x4e20, 0x9, @loopback, 0x4}, 0x1c) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x84800) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f00000000c0)={0x0, r0, 0x1}) [ 2965.449696] XFS (loop3): Unmount and run xfs_repair [ 2965.455458] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2965.464979] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2965.482463] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2965.482532] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2965.500091] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2965.502135] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2965.516816] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2965.525380] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2965.529272] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2965.542203] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2965.545911] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2965.550887] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2965.567196] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2965.576200] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2965.585007] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2965.586547] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2965.606187] XFS (loop2): SB validate failed with error -117. [ 2965.614165] XFS (loop3): SB validate failed with error -117. 20:05:18 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:18 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x5c00000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:18 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x400000000000000, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2965.758530] XFS (loop3): SB sanity check failed [ 2965.775942] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2965.797828] XFS (loop3): Unmount and run xfs_repair [ 2965.811725] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2965.826960] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2965.859235] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2965.873740] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2965.895746] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2965.904766] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2965.913637] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2965.922007] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2965.930527] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2965.939484] XFS (loop3): SB validate failed with error -117. [ 2965.957894] XFS (loop2): SB sanity check failed [ 2965.962700] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2965.985071] XFS (loop2): Unmount and run xfs_repair [ 2965.990113] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2965.997836] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2966.006078] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2966.014328] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2966.022534] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2966.030695] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2966.038917] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2966.047096] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ 20:05:19 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0xa00000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:19 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:19 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x800000000000000, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1283) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) 20:05:19 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x3, 0x100) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x8000, 0x711082) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x4, 0x4000) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r2, 0xc008551b, &(0x7f00000000c0)={0x10000, 0x8, [0x21a1, 0x0]}) ioctl$VIDIOC_S_SELECTION(r2, 0xc040565f, &(0x7f0000000140)={0xf, 0x2, 0x6, {0x1, 0x401, 0x1, 0x3f}}) [ 2966.055306] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2966.063559] XFS (loop2): SB validate failed with error -117. 20:05:19 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x5, 0x100) ioctl$TCSETAW(r1, 0x5407, &(0x7f00000000c0)={0xa6, 0x6, 0x7, 0x4, 0x3, 0x6, 0x4, 0x8, 0x4800, 0x81}) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000140)={0xb25, 0x6, 0x1, 0x0, 0x65, 0x1, 0x3f, 0x8f7e, 0x8001, 0x80, 0x52, 0x3}) 20:05:19 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:19 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) [ 2966.276930] XFS (loop3): SB sanity check failed [ 2966.281972] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2966.302716] XFS (loop3): Unmount and run xfs_repair [ 2966.307911] XFS (loop3): First 128 bytes of corrupted metadata buffer: 20:05:19 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x8000000000000003, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000004080)=0x3, 0x4) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) r2 = geteuid() syz_open_dev$dmmidi(&(0x7f0000003a80)='/dev/dmmidi#\x00', 0x5, 0x80000) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000003500)={{{@in6=@dev, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000003600)=0xe8) getresuid(&(0x7f0000003640), &(0x7f0000003680), &(0x7f00000036c0)=0x0) recvmmsg(r0, &(0x7f0000005dc0)=[{{&(0x7f0000003900)=@hci, 0x80, &(0x7f0000003ac0)=[{&(0x7f0000003980)=""/229, 0xe5}, {&(0x7f0000003a80)}], 0x2, &(0x7f0000003b00)=""/32, 0x20, 0x1ff}, 0x7fffffff}, {{&(0x7f0000003b40)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000003bc0)=""/75, 0x4b}, {&(0x7f0000003c40)=""/182, 0xb6}, {&(0x7f0000003d00)=""/158, 0x9e}, {&(0x7f0000003dc0)=""/83, 0x53}, {&(0x7f0000003e40)=""/25, 0x19}, {&(0x7f0000003e80)=""/8, 0x8}], 0x6, &(0x7f0000003f40)=""/191, 0xbf, 0x3}, 0x43a}, {{&(0x7f0000004000)=@nl=@proc, 0x80, &(0x7f00000051c0)=[{&(0x7f0000004080)}, {&(0x7f00000040c0)=""/4096, 0x1000}, {&(0x7f00000050c0)=""/235, 0xeb}], 0x3, &(0x7f0000005200)=""/58, 0x3a, 0x47}, 0x86e}, {{&(0x7f0000005240)=@rc, 0x80, &(0x7f0000005380)=[{&(0x7f00000052c0)=""/169, 0xa9}], 0x1, &(0x7f00000053c0)=""/209, 0xd1, 0x8}, 0x2}, {{&(0x7f00000054c0)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000005ac0)=[{&(0x7f0000005540)=""/100, 0x64}, {&(0x7f00000055c0)=""/235, 0xeb}, {&(0x7f00000056c0)=""/158, 0x9e}, {&(0x7f0000005780)=""/111, 0x6f}, {&(0x7f0000005800)=""/11, 0xb}, {&(0x7f0000005840)=""/248, 0xf8}, {&(0x7f0000005940)=""/115, 0x73}, {&(0x7f00000059c0)=""/248, 0xf8}], 0x8, &(0x7f0000005b40)=""/164, 0xa4, 0x6}, 0x20}, {{0x0, 0x0, &(0x7f0000005c80)=[{&(0x7f0000005c00)=""/11, 0xb}, {&(0x7f0000005c40)=""/56, 0x38}], 0x2, &(0x7f0000005cc0)=""/240, 0xf0, 0x3}, 0x6}], 0x6, 0x2061, &(0x7f0000005f40)={0x0, 0x1c9c380}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000003700)={{{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000003800)=0xe8) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f00000001c0)='./file0\x00', 0x1000, 0x7, &(0x7f0000003440)=[{&(0x7f0000000200)="c8902c228dc4df55f53c1f901fd8dae3008004cde94bd73e33cc9231f7af4331daecdbc30c5fe1efc092da790da784dd7921f87540b3", 0x36, 0x90000}, {&(0x7f0000000240)="5ae1e30f82007443a715fad8340c2f20eaac2dd0e988d2a25579613bf93d363a7c17804093d5668a56bd1da6ddf2721bcbd9ae9166778a0c9ac76c81c344e8e38d162dbb00c10b64348cee65e5928390089bd2633a382bed086af2fea8c5e497db46532002ea865e28105c03e74fff9f1a582e4a07e9fd8e2cf504319e5f09c0a05490012dcd0751442f874a0a479519d51284bd9dd66e62a7c00af9957a786fdb73a8dd07f6520fb1f60eeac3381e47a59246265b763427", 0xb8, 0x2}, {&(0x7f0000000300)="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", 0x1000, 0x80000001}, {&(0x7f0000001300)="ac12825ee198f803281618d22c72f95f0d1202ccded20839643e1f94f4d0018ded317f366112142824847eee9a7e7795df13f27335bdaed294ce2dc042792e32393cff59865eb887b1daa2b6b19764", 0x4f, 0xfffffffffffff801}, {&(0x7f0000001380)="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", 0x1000, 0x10001}, {&(0x7f0000002380)="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", 0x1000, 0x2830}, {&(0x7f0000003380)="54f8c9fe2b30fdf4665e603244ae41afaca6e7ceb7f4878011da0369daf0ce47c62f946ee65dd75c90069306441de4b3218100e7d4d3638102834ae192baa93846e85137065ea4f26b8ad588e1d9faa6dd18bd8f6587e15df3261926415375670b8fa22f8635e249c65b79433ca028ed461f6227129a96470e035d4c62f84fa34c1a0135ae833b37f754b48e985f64d05fcbbb6a0d89fc16db0901b9e758b52b362294b2488dc8", 0xa7, 0x3}], 0x1a0000, &(0x7f0000003840)=ANY=[@ANYBLOB='nobarrier,jqfmt=vfsv0,quota,resuid=', @ANYRESHEX=r2, @ANYBLOB=',inline_xattr_size=0x0000000000007fff,fowner=', @ANYRESDEC=r3, @ANYBLOB='id<', @ANYRESDEC=r4, @ANYBLOB=',euid=', @ANYRESDEC=r5, @ANYBLOB=',^']) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x400, 0x0) 20:05:19 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x3f000000, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2966.333395] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2966.367239] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ 20:05:19 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x81000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2966.411896] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2966.447227] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ 20:05:19 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x101, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x4000, 0x0) renameat(r1, &(0x7f00000000c0)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00') alarm(0x8) [ 2966.480419] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2966.490802] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2966.499826] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2966.508675] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:05:19 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x10, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2966.540279] XFS (loop3): SB validate failed with error -117. [ 2966.604084] XFS (loop2): SB sanity check failed [ 2966.609165] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2966.620747] XFS (loop2): Unmount and run xfs_repair [ 2966.651131] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2966.661271] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2966.669656] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2966.678123] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2966.701845] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2966.710914] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2966.726872] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2966.743451] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2966.751757] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2966.760183] XFS (loop2): SB validate failed with error -117. 20:05:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1283) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) 20:05:20 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x1000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:20 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:20 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0xa18, 0x101000) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f00000000c0)=@req3={0x8, 0xee, 0x401, 0x5, 0x3ff, 0x80, 0x617}, 0x1c) 20:05:20 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="78667303", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x19ed3fca4b020000, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:20 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x8035, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:20 executing program 0: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x100000001, 0x605b1bb58ed7b3ab) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x100, "e4a43c9321fa", 0x200}, 0x80, &(0x7f0000004480)=[{&(0x7f0000000240)="31d9a13cfcd17b380280e67ae5af51131b6974cbf608da703026d3c5e3e62129bd293478688e010141757725875f72c8f6a77c8c10c889f5123ab171eff7dd5c5aa11651ce56317fe475d9d142aa269a5ec1d78c26bfe027db5382b2d23118969717ce0578897edb0879be7d1f1280aabd5b5090303f162c166703457ff7aa7f2604520a500c7445cd40c3d667876349721a3e04e5b9cf24c579", 0x9a}, {&(0x7f0000000300)="f4c6f1c10e6ed46241a2b9533c425b4cea0892c6cd65e4a364978b28797e243f19b01d5e2bf14aaec028f1daadf2cac58af2de35288b416e83e6b237ac41915929428d4871351b92a77f5077cff12e69586f409a42cb4b4e564d413bd2ed7c12757dab06be716f28f9d3c5c21ea6870f7011cc6b896b1e47875f80292f2f48d87ca70d5b7f3a09b66e7279bec7966c6ceff314216eeba750db87688ccb1aa6912f63866ed083cb5dbc290fc46b46d3292830665a4b83e69658d5772d6706d595bc652c3ecaed24fb8a670ae4c52e661b14968c9fd95ec753313d2bcdaabfc29f8534434b6d3676f74301e9073bbf", 0xee}, {&(0x7f00000000c0)="037f0a49c615b3a4ec3c44111059", 0xe}, {&(0x7f0000000400)="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", 0x1000}, {&(0x7f0000001400)="9e2e9a086a43750a90ec441931e94b1cb80f7f4f731fde1ec0391250978b3a6eed40a4a47b286a7eb6ddf42adb46d2c6937a9615fd6ce131bb10cae38c0e8d54c4d5ef91cb2e1442fe14d3a9f5d9a9659473f98ee7e88a8c58b99358bb35d43e299a06fbb15a554e06ae1fb2956d27", 0x6f}, {&(0x7f0000001480)="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", 0x1000}, {&(0x7f0000002480)="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", 0x1000}, {&(0x7f0000003480)="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", 0x1000}], 0x8, &(0x7f0000005900)=ANY=[@ANYBLOB="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"], 0x12f8, 0x51}, 0x800) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:05:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x400300, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:20 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="786673ac", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) [ 2967.224913] XFS (loop3): SB sanity check failed [ 2967.229872] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2967.278118] XFS (loop3): Unmount and run xfs_repair 20:05:20 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x4305, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2967.299911] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2967.320125] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2967.340596] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2967.349636] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2967.358410] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2967.367460] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 20:05:20 executing program 0: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x30000, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20080080}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=@ipv4_delroute={0x2c, 0x19, 0x400, 0x70bd27, 0x25dfdbfb, {0x2, 0x0, 0x20, 0x6, 0xfe, 0x7, 0xff, 0x1, 0x500}, [@RTA_PREFSRC={0x8, 0x7, @multicast1}, @RTA_DST={0x8, 0x1, @loopback}]}, 0x2c}}, 0x1) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl(r1, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x8, 0x0) [ 2967.398295] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2967.441113] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2967.450346] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2967.458814] XFS (loop3): SB validate failed with error -117. 20:05:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1283) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) 20:05:21 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x34000, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:21 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x7, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:21 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f00000000c0)={0x9, 0x5}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000300)={0x0, 0x6}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000380)={r2, @in={{0x2, 0x4e22, @local}}}, 0x84) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r1, &(0x7f00000001c0)="87cce0c84d61161867061cae7d5295f6888350aca4ba4415ebccaf3c9f14aa7d9ff1da2cd1edd9d71caaa629d9cb2dbd76f1b45192f37c13943c6caeba06e0142b1cf9426092575898a7585f45e81ccf21ca843bf3", &(0x7f0000000240)=""/145}, 0x18) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:05:21 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:21 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:21 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x800000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:21 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40000, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x81) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:05:21 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x2, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:21 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x88a8ffff00000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2968.170709] XFS (loop3): SB sanity check failed [ 2968.176225] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 20:05:21 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r1, 0xc0485619, &(0x7f0000000140)={0x5d, 0x44, "abd4a68dcc347863cb33b545e368de062b168b2e00212820", {0x2, 0x3ff}, 0xff}) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x1ff, 0x2, 0x100004, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) [ 2968.218195] XFS (loop2): SB sanity check failed [ 2968.229998] XFS (loop3): Unmount and run xfs_repair [ 2968.235513] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2968.242518] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2968.265495] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2968.272810] XFS (loop2): Unmount and run xfs_repair [ 2968.278911] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2968.285795] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2968.292512] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2968.303278] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ 20:05:21 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x88470000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2968.304301] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2968.317427] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2968.321241] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2968.344963] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2968.353217] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2968.353250] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2968.353260] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2968.353270] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2968.353283] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2968.375546] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2968.402980] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2968.411365] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2968.420238] XFS (loop3): SB validate failed with error -117. [ 2968.427168] XFS (loop2): SB validate failed with error -117. [ 2968.603641] XFS (loop2): SB sanity check failed [ 2968.608449] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2968.634680] XFS (loop2): Unmount and run xfs_repair [ 2968.639791] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2968.646536] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2968.654738] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2968.662905] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2968.671047] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2968.679249] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2968.687438] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2968.695680] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2968.703861] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2968.712088] XFS (loop2): SB validate failed with error -117. 20:05:22 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x4, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) 20:05:22 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x800e0000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:22 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="786673ea", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:22 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:22 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x40400, &(0x7f0000000140)={[{@metacopy_on='metacopy=on'}, {@default_permissions='default_permissions'}], [{@subj_user={'subj_user', 0x3d, 'xfs\x00'}}]}) 20:05:22 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x2, 0x0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f00000001c0)=""/90) rt_sigpending(&(0x7f0000000040), 0x8) 20:05:22 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x8000a0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:22 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x1000000, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:22 executing program 0: prctl$PR_SVE_SET_VL(0x32, 0xe489) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:05:22 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0xf000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2969.140014] XFS (loop2): SB sanity check failed [ 2969.145155] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2969.160688] XFS (loop2): Unmount and run xfs_repair 20:05:22 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) [ 2969.189811] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2969.213779] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2969.224539] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ 20:05:22 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000040)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) [ 2969.243369] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2969.256398] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2969.274305] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2969.302292] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2969.334973] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2969.344138] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2969.352803] XFS (loop2): SB validate failed with error -117. [ 2969.384148] XFS (loop3): SB sanity check failed [ 2969.389132] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2969.400604] XFS (loop3): Unmount and run xfs_repair [ 2969.406117] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2969.412868] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2969.421005] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2969.429175] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2969.437384] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2969.445564] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2969.453763] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2969.461894] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2969.470113] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2969.478447] XFS (loop3): SB validate failed with error -117. [ 2969.588167] XFS (loop3): SB sanity check failed [ 2969.593424] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2969.604640] XFS (loop3): Unmount and run xfs_repair [ 2969.609661] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2969.616451] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2969.624632] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2969.624643] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2969.640948] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2969.640958] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2969.640968] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2969.640978] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2969.640988] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2969.649375] XFS (loop3): SB validate failed with error -117. 20:05:23 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0xb, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:23 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) 20:05:23 executing program 0: pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000040)={0x320, 0x1e4}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000100)={0x401, 0x1, 0x0, 0x6b020000, 0xc000000000000000, 0x7f, 0x7f, 0x5, 0x7, 0x6, 0x41, 0x6}) ioctl(r2, 0x20000000008912, &(0x7f0000000000)="0a5c2d0240316285717070") ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f00000000c0)={0x7, 0x8001, 0x1}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000140)=[@in6={0xa, 0x4e24, 0x1, @mcast2, 0x1a90}, @in={0x2, 0x4e23, @broadcast}], 0x2c) 20:05:23 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x3f00000000000000, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:23 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:23 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:23 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x4305000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:23 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000040)=0x78) 20:05:23 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x4000000, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2969.976313] XFS (loop2): SB sanity check failed [ 2969.981192] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2970.013217] XFS (loop2): Unmount and run xfs_repair [ 2970.041402] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2970.052383] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2970.060947] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2970.073412] XFS (loop3): SB sanity check failed [ 2970.074407] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 20:05:23 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) 20:05:23 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x8906000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2970.083076] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2970.086783] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ 20:05:23 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x10b000, 0x0) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f00000000c0)=0xc040, 0x4) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f0000000140)) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) [ 2970.141418] XFS (loop3): Unmount and run xfs_repair [ 2970.143072] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2970.152348] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2970.161387] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2970.173122] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2970.182932] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 20:05:23 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) [ 2970.194314] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2970.206638] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2970.219118] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2970.224244] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:05:23 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x7000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:23 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x3f00, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2970.254424] XFS (loop2): SB validate failed with error -117. [ 2970.255031] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 20:05:23 executing program 0: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x2, 0x0) ioctl(0xffffffffffffffff, 0x820000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sched_getparam(r1, &(0x7f0000000140)) [ 2970.300653] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2970.316984] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2970.404466] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2970.423829] XFS (loop3): SB validate failed with error -117. 20:05:23 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:23 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40000, 0x0) ioctl$KDENABIO(r1, 0x4b36) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:05:23 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) 20:05:23 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x8864, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:23 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs~', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:23 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x3, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:23 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) [ 2970.694166] XFS (loop2): SB sanity check failed [ 2970.698992] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2970.730079] XFS (loop2): Unmount and run xfs_repair 20:05:23 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x4888, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:23 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") r1 = dup3(r0, r0, 0x80000) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000240)=r2, 0x4) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) [ 2970.753719] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2970.785403] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ 20:05:24 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x9, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2970.848201] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2970.886559] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 20:05:24 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x4788, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:24 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = semget(0x3, 0x4, 0x22) semctl$IPC_RMID(r1, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"]) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") r2 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0xffb7bbb730f934a6) r3 = getpgrp(0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000440)=0xc) sendmsg$nl_generic(r2, &(0x7f0000000540)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4008000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x4c, 0x25, 0x4, 0x70bd2c, 0x25dfdbfb, {0xf}, [@typed={0x8, 0x58, @pid=r3}, @typed={0x8, 0x65, @pid=r4}, @nested={0x24, 0x59, [@generic="0c7c8cf6b67b3a61f1f8a7fd442f58d218a6389a4854939e1d31e6d98d1a"]}, @typed={0x4, 0x51}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000050}, 0x880) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) [ 2970.931075] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2970.950201] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2970.963349] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2970.971521] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2970.979897] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2970.988286] XFS (loop2): SB validate failed with error -117. [ 2971.184873] XFS (loop2): SB sanity check failed [ 2971.189615] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2971.200793] XFS (loop2): Unmount and run xfs_repair [ 2971.205923] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2971.218913] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2971.227294] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2971.250745] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2971.262523] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2971.270701] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2971.281013] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2971.289324] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2971.297563] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2971.305794] XFS (loop2): SB validate failed with error -117. 20:05:24 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="78667301", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:24 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) 20:05:24 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0xc838, 0x20000) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:05:24 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x17, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:24 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0xa, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:24 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="78667303", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:24 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0xfeffffff00000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:24 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x42ff383e4944b8f7, 0x0) ioctl$RTC_AIE_OFF(r1, 0x7002) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:05:24 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) 20:05:24 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\a', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:24 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x8, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:24 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:24 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x100000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:24 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) 20:05:24 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) fcntl$getown(r0, 0x9) 20:05:24 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x4, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:25 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x806000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:25 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) [ 2971.803254] XFS (loop2): SB sanity check failed [ 2971.818717] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 20:05:25 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) 20:05:25 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0xa8c0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x300, 0x40) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r1, 0xc0105303, &(0x7f0000000140)={0x9, 0x6, 0x100}) write$FUSE_INIT(r1, &(0x7f00000001c0)={0x50, 0x0, 0x2, {0x7, 0x1c, 0x10000, 0x0, 0x4, 0x8001, 0x10b580, 0x8892}}, 0x50) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) [ 2971.889726] XFS (loop2): Unmount and run xfs_repair [ 2971.929155] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2971.940555] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2971.949260] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ 20:05:25 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x80ffffff00000000, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2972.004850] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 20:05:25 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x88caffff, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:25 executing program 0: prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) [ 2972.051329] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2972.109253] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2972.117878] XFS (loop3): SB sanity check failed [ 2972.133000] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2972.139845] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2972.148478] XFS (loop3): Unmount and run xfs_repair [ 2972.167313] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2972.172520] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2972.177311] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2972.190704] XFS (loop2): SB validate failed with error -117. [ 2972.202224] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2972.222409] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2972.233474] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2972.242634] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2972.250908] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2972.259435] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2972.267899] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2972.276238] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2972.284633] XFS (loop3): SB validate failed with error -117. [ 2972.326681] XFS (loop2): SB sanity check failed [ 2972.331388] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2972.343432] XFS (loop2): Unmount and run xfs_repair [ 2972.348664] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2972.355476] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2972.363646] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2972.371772] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2972.379993] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2972.388195] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2972.396364] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2972.404546] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2972.412738] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2972.421049] XFS (loop2): SB validate failed with error -117. 20:05:25 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:25 executing program 4: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) 20:05:25 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x800000000000000, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:25 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0xfffffffffffffeb4}], 0x0, 0x0) 20:05:25 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0xd000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:25 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0xb00, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:25 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x1e000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:25 executing program 4: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) 20:05:25 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x200000000000000, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:25 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x600, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:25 executing program 4: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) [ 2972.841651] XFS (loop2): SB sanity check failed [ 2972.853096] XFS (loop3): SB sanity check failed [ 2972.853282] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2972.857981] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2972.881214] XFS (loop2): Unmount and run xfs_repair [ 2972.886660] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2972.893753] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2972.902678] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2972.911294] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2972.920090] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2972.932488] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 20:05:26 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0xffffa888, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2972.934426] XFS (loop3): Unmount and run xfs_repair [ 2972.952766] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2973.004407] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2973.012992] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2973.026922] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2973.047588] XFS (loop2): SB validate failed with error -117. [ 2973.053908] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2973.079750] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2973.092173] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2973.114435] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2973.129611] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2973.139840] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2973.149021] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ 20:05:26 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:26 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x8000000, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:26 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) 20:05:26 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0xffffffffa0008000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:26 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x3, 0x40000) r2 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x2, 0x80000) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xf, 0x9, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x7fff}, [@alu={0x7, 0xca00, 0x5, 0xf, 0x0, 0xfffffffffffffffa, 0xffffffffffffffff}, @map={0x18, 0xb, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @exit]}, &(0x7f0000000140)='syzkaller\x00', 0x6, 0xa7, &(0x7f0000000240)=""/167, 0x41000, 0x1, [], 0x0, 0xf}, 0x48) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) [ 2973.157689] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2973.174484] XFS (loop3): SB validate failed with error -117. 20:05:26 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x8848000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:26 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:26 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x7, 0x8080) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000000c0)=0x29) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:05:26 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) 20:05:26 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x80ffffff, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:26 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0xb000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:26 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) [ 2973.548056] XFS (loop2): SB sanity check failed [ 2973.553848] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2973.585312] XFS (loop2): Unmount and run xfs_repair [ 2973.590467] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2973.598090] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2973.606657] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2973.615398] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2973.623899] XFS (loop3): SB sanity check failed [ 2973.628725] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2973.632250] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2973.647737] XFS (loop3): Unmount and run xfs_repair [ 2973.649337] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2973.664023] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2973.672821] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2973.677273] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2973.682417] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2973.696170] XFS (loop2): SB validate failed with error -117. [ 2973.696215] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2973.710341] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2973.718663] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2973.726868] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2973.736003] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2973.745546] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2973.753934] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2973.762331] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2973.770510] XFS (loop3): SB validate failed with error -117. [ 2973.804482] XFS (loop2): SB sanity check failed [ 2973.809167] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2973.820488] XFS (loop2): Unmount and run xfs_repair [ 2973.825549] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2973.832269] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2973.840392] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2973.848559] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2973.856750] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2973.864958] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2973.873136] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2973.881278] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2973.889458] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2973.897686] XFS (loop2): SB validate failed with error -117. 20:05:27 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x24bca3fed19, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:27 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000001500)={0x0, @speck128, 0x1057586b73bc183a, "2bda8586eb7384d2"}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'L-', 0x6}, 0x28, 0x2) ioctl(r1, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") r2 = memfd_create(&(0x7f0000000280)="786673007345f8d3ec155cf357663d97d787b23ae385126b635291207d89d1de285a6c18d9b0eb1f52b8298892ff9151fb589dbb1c86d1da95fb455a1c5d1b279858d056d9ddb71a58c46da889adeefb1b22a9335aa98830f6b6ee0ef1", 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f00000001c0)={0x9d0000, 0x200, 0x80000000, [], &(0x7f0000000140)={0x9b0b72, 0xee, [], @p_u8=&(0x7f00000000c0)=0x1f}}) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:05:27 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x5c000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:27 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) 20:05:27 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x80350000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2973.997896] XFS (loop3): SB sanity check failed [ 2974.003178] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2974.017453] XFS (loop3): Unmount and run xfs_repair [ 2974.023260] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2974.031219] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2974.092651] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2974.100818] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2974.125943] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2974.137840] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2974.155997] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2974.170821] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2974.179484] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2974.188303] XFS (loop3): SB validate failed with error -117. [ 2974.205026] XFS (loop2): SB sanity check failed [ 2974.209782] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2974.220974] XFS (loop2): Unmount and run xfs_repair [ 2974.226074] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2974.232821] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2974.240957] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2974.249162] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2974.257353] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2974.265557] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2974.273785] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2974.281926] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ 20:05:27 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffff0406, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) 20:05:27 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x8000000080000001, &(0x7f0000000100)="0100000000290003000000be") r1 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x30000000000, 0x80040) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@mcast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x10, &(0x7f0000000600)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',version=9p2000.u,hash,fowner<', @ANYRESDEC=r2, @ANYBLOB="2c6f626a5f757365723d73656c666d696d655f747970314f5a2d7190863f7ca219888d8a9865262d4725282c00b6ffca672f6145a13813a231abf3fcc53ae5f7ef901e3d12f2f58204cb9af0c26ab04b3ef4080f8f70d9977068c97e0354ed0f71bc0fe4119d7dedbe89ad0a0f7b337b9188f96c3081358c52256999e4ccf4aa011b252602c6595b4c12f884c99fb207684b1091bd2ab1be9ecf09397025ece45e805911681574c983d96f5749490a966d65d2d69d5b1e4b72bd7faa8299515cac9bafd884493a3ac9085c8105be1c06e7df7a05dd134d4d7a27c635ba0018c19bf1f9b05c49"]) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) write$P9_RCLUNK(r1, &(0x7f0000000300)={0x7, 0x79, 0x1}, 0x7) 20:05:27 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x2, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:27 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0xffffdd86, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2974.290105] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2974.298366] XFS (loop2): SB validate failed with error -117. 20:05:27 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x3, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:27 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f00000002c0)=0x7) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x3, 0x80) sendto$llc(r2, &(0x7f00000001c0)="a9ef39144daea9452030d2b08265b8b68e186007f9b0be24295f7db157839252ba7d06d712ab14e28f6804350f0f2ee576ea174416254271e8ce4f1a708d2d93c8e1a7eee00511f92ebee5a3fe3d99117fa5055746d7e5a68dfff7f926bea1518c84b1483987f9785d29d39bd0dddb17e6ffc7769f6a638cbff5ad323deb0c50c0b8e7e9014c58a9cd0d8f2ec16068560b0662aa290caebadc34afc8bc07705bc99e9b074b4bac9a6028576b33d8397d9b04252d2b23a074b9dfe8f9c05e008bad707b174349040f83fcf1699521fe784eba9e75f04398d124b50ace25dc0f5433de7b2176f899bd5bcffbfde4b314", 0xef, 0x0, &(0x7f0000000140)={0x1a, 0x32f, 0x6, 0x3, 0x8, 0x8}, 0x10) ioctl(r1, 0x20000000008912, &(0x7f00000000c0)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) clock_gettime(0x2, &(0x7f0000000040)) 20:05:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) 20:05:27 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x400000000000000, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:27 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfsL', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:27 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x200000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:27 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0xfdffffff, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2974.685543] XFS (loop3): SB sanity check failed [ 2974.693409] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2974.747675] XFS (loop3): Unmount and run xfs_repair [ 2974.776099] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2974.789927] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2974.798729] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2974.807494] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2974.816246] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2974.825247] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2974.836592] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2974.845216] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2974.853604] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2974.861798] XFS (loop3): SB validate failed with error -117. 20:05:28 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) 20:05:28 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fgetxattr(r0, &(0x7f0000000040)=@random={'user.', 'xfs\x00'}, &(0x7f00000001c0)=""/90, 0x5a) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x210000, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f0000000240)={r2, r3/1000+30000}, 0x10) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) 20:05:28 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0xffffff80, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:28 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:28 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xd, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:28 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x7000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:28 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x88640000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:28 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) prctl$PR_SET_UNALIGN(0x6, 0x1) ioctl(r0, 0x7fffffff, &(0x7f0000000080)="0a5c2d0240316285717050") fsetxattr(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="73806375726974792e5b6d696d655f747970652c2d2900"], &(0x7f0000000140)='cpuset&\x00', 0x8, 0x3) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000040)=0x6, 0x2) r2 = geteuid() ioprio_get$uid(0x3, r2) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) socketpair(0x1, 0xd00aca6a65c50a93, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$KVM_ARM_SET_DEVICE_ADDR(r3, 0x4010aeab, &(0x7f0000000200)={0x4, 0x1000}) 20:05:28 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) 20:05:28 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x34000, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:28 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0xd00000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:28 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) 20:05:28 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, &(0x7f00000000c0)={0x2, 0xfffffffffffffffe}) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, 0x0) [ 2975.233162] XFS (loop2): SB sanity check failed [ 2975.238174] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2975.291165] XFS (loop3): Invalid superblock magic number [ 2975.293421] XFS (loop2): Unmount and run xfs_repair [ 2975.321527] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2975.331100] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ 20:05:28 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x10000000, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:28 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x86ddffff00000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2975.350294] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2975.364970] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2975.422905] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2975.439259] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2975.458892] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2975.474738] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2975.482974] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2975.491184] XFS (loop2): SB validate failed with error -117. 20:05:28 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) 20:05:28 executing program 0: ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) pipe(&(0x7f0000000200)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={&(0x7f00000001c0)='./file0\x00', r1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000780)={r0, 0x0, 0x0}, 0x18) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r2, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x307000, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000280)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)='XFSB', 0x4, 0x6}], 0x40803, 0x0) 20:05:28 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x4000000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:28 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xe, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:28 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:28 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x3f000000, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:29 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) 20:05:29 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f00000001c0)=""/249) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$bt_l2cap(r0, &(0x7f0000000140)={0x1f, 0x701160a9, {0x2, 0x5, 0x3, 0x6, 0x7fff, 0x9}, 0x61, 0x4ab3f2b7}, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400204) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f0000000040)=""/2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000080)={0x1, 0x70, 0x9, 0x80000001, 0x1000, 0x10001, 0x0, 0x9, 0x82, 0x8, 0x1, 0x3, 0x31, 0x4, 0xffffffffffffffe1, 0x9da0ad8, 0x0, 0xc5d, 0x7f, 0x0, 0x2, 0x9, 0x6, 0x80000000, 0x4, 0x100000001, 0x0, 0x5, 0x2, 0x4, 0x9, 0x7fc00, 0x2, 0x3, 0x1, 0x9, 0x9, 0x10000, 0x0, 0x7, 0x6, @perf_config_ext={0x3f, 0x3b028617}, 0x240, 0x100000001, 0x7, 0x7, 0x10000, 0x6, 0x180}) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) 20:05:29 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0xa0008000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0xfdffffff00000000, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2975.940163] XFS (loop2): SB sanity check failed [ 2975.945212] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2975.976212] XFS (loop3): Invalid superblock magic number 20:05:29 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) 20:05:29 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f00000001c0)=""/249) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$bt_l2cap(r0, &(0x7f0000000140)={0x1f, 0x701160a9, {0x2, 0x5, 0x3, 0x6, 0x7fff, 0x9}, 0x61, 0x4ab3f2b7}, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400204) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f0000000040)=""/2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000080)={0x1, 0x70, 0x9, 0x80000001, 0x1000, 0x10001, 0x0, 0x9, 0x82, 0x8, 0x1, 0x3, 0x31, 0x4, 0xffffffffffffffe1, 0x9da0ad8, 0x0, 0xc5d, 0x7f, 0x0, 0x2, 0x9, 0x6, 0x80000000, 0x4, 0x100000001, 0x0, 0x5, 0x2, 0x4, 0x9, 0x7fc00, 0x2, 0x3, 0x1, 0x9, 0x9, 0x10000, 0x0, 0x7, 0x6, @perf_config_ext={0x3f, 0x3b028617}, 0x240, 0x100000001, 0x7, 0x7, 0x10000, 0x6, 0x180}) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) 20:05:29 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x70000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2976.008227] XFS (loop2): Unmount and run xfs_repair [ 2976.019468] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2976.026592] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2976.035558] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ 20:05:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x1000000000000000, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2976.061483] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2976.092251] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ 20:05:29 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:29 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0xffffca88, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2976.125957] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2976.175347] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2976.202839] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2976.214493] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2976.231321] XFS (loop2): SB validate failed with error -117. [ 2976.334166] XFS (loop2): SB sanity check failed [ 2976.339197] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2976.352384] XFS (loop2): Unmount and run xfs_repair [ 2976.358447] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2976.365709] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2976.374593] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2976.383533] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2976.391911] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2976.399378] XFS (loop3): Invalid superblock magic number [ 2976.400503] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2976.413920] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2976.422059] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2976.430257] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2976.438487] XFS (loop2): SB validate failed with error -117. 20:05:29 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:29 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f00000001c0)=""/249) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$bt_l2cap(r0, &(0x7f0000000140)={0x1f, 0x701160a9, {0x2, 0x5, 0x3, 0x6, 0x7fff, 0x9}, 0x61, 0x4ab3f2b7}, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400204) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f0000000040)=""/2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000080)={0x1, 0x70, 0x9, 0x80000001, 0x1000, 0x10001, 0x0, 0x9, 0x82, 0x8, 0x1, 0x3, 0x31, 0x4, 0xffffffffffffffe1, 0x9da0ad8, 0x0, 0xc5d, 0x7f, 0x0, 0x2, 0x9, 0x6, 0x80000000, 0x4, 0x100000001, 0x0, 0x5, 0x2, 0x4, 0x9, 0x7fc00, 0x2, 0x3, 0x1, 0x9, 0x9, 0x10000, 0x0, 0x7, 0x6, @perf_config_ext={0x3f, 0x3b028617}, 0x240, 0x100000001, 0x7, 0x7, 0x10000, 0x6, 0x180}) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000000)={0x2}) 20:05:29 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) 20:05:29 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x5c, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x19ed3fca4b020000, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:29 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x8847000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:29 executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7, 0x100) r2 = accept$nfc_llcp(r1, &(0x7f0000000040), &(0x7f00000000c0)=0x60) r3 = getpgid(0xffffffffffffffff) getpgid(r3) sched_setscheduler(r3, 0x1, &(0x7f0000000440)=0x9) getpeername(r0, &(0x7f0000000280)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000100)=0x80) ioctl$BLKPG(r4, 0x1269, &(0x7f0000000240)={0xd, 0x1, 0xb3, &(0x7f0000000380)="200315be8e66f4ebf7b321f36dd40722c355e703a4be8f063349b042d84b3723ece6d6a769a612f14083fc52604b4855de15471fcb6a82e7d062b47bc1742e683b7b2cb6dd26990813a633b1c3c72d829f0e5c53746d6f81a70fc52ef44df0828392c0ffd9e49cf2bef4076de342542981c8f848fce29a8e32bef0ef3ca6f62d8ad8fc75a3f17b3adb42dec323f61649f93a77f0bdb9592d0d3a7f7fa7429bf94ad31b0bfac7a8246b1153fea4aa22c3166ba1"}) read$eventfd(r1, &(0x7f0000000200), 0x2) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r1, 0xc01064b5, &(0x7f0000000540)={&(0x7f0000000300)=[0x0, 0x0, 0x0], 0x3}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) sched_setscheduler(r5, 0x0, &(0x7f00000001c0)=0x10000) r6 = socket$inet_udplite(0x2, 0x2, 0x88) openat$userio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/userio\x00', 0x8000, 0x0) ioctl$VIDIOC_S_AUDIO(r2, 0x40345622, &(0x7f0000000480)={0x8, "e395673bdedcb77c88af66e66c8babe671107ceca0e82e3505477f323fea1170", 0x3, 0x1}) write$nbd(r6, &(0x7f00000004c0)=ANY=[@ANYBLOB="6744669801000000030004eb000100000049bcc4c73598e2e93e68f17d8e39fda5d94ef71d6b854d4250d97bd7a6efb2cc2fb4036a007ad73deb1bb83323b29cf37a33"], 0x41) ioctl$VIDIOC_SUBDEV_G_EDID(r1, 0xc0285628, &(0x7f00000005c0)={0x31a3bfb, 0x1, 0x800, [], &(0x7f0000000580)=0x28000}) 20:05:29 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:29 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) 20:05:29 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0xfffff000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0xffffff7f00000000, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x1000000000000005, 0x20000000100) sendmsg(r0, &(0x7f00000000c0)={&(0x7f0000000000)=@pptp={0x18, 0x2, {0x3, @broadcast}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)="6de57398aa0e21c6efe04ca08b7b2480823aebeb785db5b4248fb1ccba0f73f3247fc02bb5b451b8ae60e0d895b7302e3cd458c3e0c6885f641fccccc8d289c6e0fcfbfca96fef9ad5c3310591d93ec5155f348075a2785267ed3f4dcb9770f0797998c4a0fc571999618ee641d077b5331e294a73ac5f9bd6dc399d1e874801ea2390a36a739bef0b73a0dbdf901f5db6853b1af392882de6c2d45d499ab44212fba47d23c1454deee58f1d4647e063f9718684919c3844477ad2ef45823f3167557e", 0xc3}, {&(0x7f00000003c0)="0c0af53eaaa86d42e9bbc0798f5755eb7fbc5bacd0867bd457eb90c3e5466ce81f0c636d56539fc05ec3fd3d1c96047eacf3a451a8f05344109bd90b8dfa4f5ddae38e97571045ff23cdc7d7e35c8032f39de2522b732777953d3fe04279e9c81c17e197093b4953764a9570b33b7cbd07e97e6e1310f73e63331ae2b7ed2b1ca46417e1a87b32ae3e1471c76d0c789510d8c80ac87984c31828d78500eb4577fad8e06183c8ecd8cb0c2f9030b5a56c8bf38135546f96054ec564abc6f741018a2556c0d3e4ee91d8424b73b1615647e47ee4dfb349a73233197d3c7f263e3a5e", 0xe1}], 0x2, &(0x7f00000004c0)=[{0x60, 0x1, 0x11e, "eed2d4b1630aadf8d640fd3db0e933ea9aca46c2ac72619e03bcae187f6eeb638c33627b3e2580ab2d0573f49cbf2a0711cd6250bbef0e08092cf605d3015808123e6efd138fd7ae45"}, {0x28, 0x105, 0x40, "13986f85d1817e33137affec6fd6390d84"}, {0x110, 0x10f, 0x2, "773b4427ce9d6368a84b70e8ba32079357eb3c8f221c93fa0dfe67f768f1ba16f775778405881da818efc6047410069199650f3cfecb72acfae55f181a9a5c00b815ab54f4a9449a63c3707848fa2c1f67912d3dd860cbef8befbce569f6253a53610eea27c7338a99bc6fa7bec961ee45228c9cb67858b93f466f5ad145e2ba4116e54422e5f84978b2bcf4c9b68dc53ac8cd39ff296b00407fb044e90a6388346297a5da25ad0a5e27872395928571a68060cbf9a9a0eee03fbbeae2865297a603571db59f09e38bae0e8f52b334f79037ad058ac24a1c289a83f6c39d560023fe1b5ad7b8113fd36084b847435f1855a700581baeb638d7"}, {0x28, 0x0, 0xfffffffffffffc00, "eb73843252e850fc6909aca547c2bffc2688f4"}, {0x10, 0x102, 0x8}, {0x70, 0x12f, 0x6, "689f65cbc81524f7b3a6ea15614ef49428f176543c21993983dd41e04a0d383e53e489d2cb8ae7837aa53c5a4065120db671cd77914eab60603f2a39a371e0a3a8667206288bfb4e6d51aa9bc3622e78cfed9ebe4af48cca80ad52e8f0e2"}, {0x20, 0x113, 0x0, "d0cf789d026bc48f6e26bd91ba12"}], 0x260, 0x1}, 0x4008000) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000380)="24000000100001000000fd946fa2830020200a0009000300001c85680c1ba3a20400ff5e", 0x24}], 0x1}, 0x0) [ 2976.821876] XFS (loop3): SB sanity check failed [ 2976.829007] XFS (loop2): SB sanity check failed [ 2976.833809] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2976.849527] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2976.882294] XFS (loop3): Unmount and run xfs_repair [ 2976.890766] XFS (loop2): Unmount and run xfs_repair [ 2976.896243] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2976.897449] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2976.922964] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2976.936517] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2976.936872] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2976.956072] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2976.964500] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2976.967197] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2976.978887] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2976.981363] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2976.989296] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2976.998309] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2977.006081] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2977.016035] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2977.022622] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2977.030884] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2977.038832] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2977.047559] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2977.055964] XFS (loop3): SB validate failed with error -117. [ 2977.064272] XFS (loop2): SB validate failed with error -117. [ 2977.177345] XFS (loop3): SB sanity check failed [ 2977.182466] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2977.199119] XFS (loop3): Unmount and run xfs_repair [ 2977.211051] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2977.219051] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2977.227733] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2977.236327] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2977.244573] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2977.252826] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2977.260992] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2977.269162] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ 20:05:30 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0xffffff7f, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:30 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) 20:05:30 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x14, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:30 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="786673fc", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:30 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000140)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) r2 = socket$netlink(0x10, 0x3, 0x4) read(r2, &(0x7f0000000300)=""/136, 0x88) sendmsg$nl_generic(r2, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400faff0000070800000061eb00000000ff00062ab28708c952adf80f7c844ab7a2e10da5da021962f71e6b6551576b6b3de73e59e05309369d41f0e778cf111357fe366cfc6137d1c706527ef9ff90eae6e318ad68143c178a95e3b9915fd4a087472000707b38d4509997a22a"], 0x14}}, 0x0) [ 2977.277351] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2977.285542] XFS (loop3): SB validate failed with error -117. 20:05:30 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x6000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:30 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x800e000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:30 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) 20:05:30 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x1000000, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:30 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) 20:05:30 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:30 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x8000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:30 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x3f00000000000000, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:30 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) 20:05:30 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x43050000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2977.717444] XFS (loop3): SB sanity check failed [ 2977.729245] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 20:05:30 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x10, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2977.790771] XFS (loop3): Unmount and run xfs_repair [ 2977.811020] XFS (loop2): SB sanity check failed [ 2977.815929] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2977.838964] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2977.851942] XFS (loop2): Unmount and run xfs_repair [ 2977.873496] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2977.882740] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2977.896190] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2977.908347] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2977.916851] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2977.946354] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2977.959415] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2977.969987] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2977.978341] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2977.986839] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2977.997393] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2978.012428] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2978.020668] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2978.029319] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2978.037868] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2978.046307] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2978.054868] XFS (loop2): SB validate failed with error -117. [ 2978.061015] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2978.069437] XFS (loop3): SB validate failed with error -117. 20:05:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7, 0x2) ioctl$VHOST_RESET_OWNER(r2, 0xaf02, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000022000104000b0c000000000000000000"], 0x14}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newpolicy={0xfc, 0x13, 0x1, 0x0, 0x0, {{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, [@tmpl={0x44, 0x8, [{{@in6}, 0x0, @in6=@dev}]}]}, 0xfc}, 0x8}, 0x0) openat$cgroup_type(r2, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) [ 2978.220598] XFS (loop3): SB sanity check failed [ 2978.225412] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2978.237024] XFS (loop3): Unmount and run xfs_repair [ 2978.242252] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2978.248931] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2978.257162] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2978.265363] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2978.273552] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2978.273563] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2978.273574] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2978.273598] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2978.313063] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:05:31 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xd000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:31 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x89060000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:31 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) 20:05:31 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x100000000000000, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:31 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000280)=0x200000000) write$vnet(r0, &(0x7f0000000200)={0x1, {&(0x7f00000000c0)=""/46, 0xfffffffffffffe5d, 0x0, 0x3, 0x2}}, 0x3d) modify_ldt$write2(0x11, &(0x7f0000000040)={0x1, 0x20101800, 0x2000, 0x1, 0x2, 0x7, 0x9, 0x1, 0x100000001, 0x1}, 0x10) 20:05:31 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) [ 2978.321280] XFS (loop3): SB validate failed with error -117. 20:05:31 executing program 0: open(&(0x7f0000000000)='./file0\x00', 0x2000, 0x3b) syz_emit_ethernet(0x72, &(0x7f0000000180)={@link_local, @link_local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @rand_addr, {[@timestamp={0x44, 0xc, 0x6, 0x3, 0x0, [{[@multicast1]}]}]}}, @gre}}}}, &(0x7f0000000040)) 20:05:31 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) 20:05:31 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0xd, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:31 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x1e, 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x118) sendmsg(r1, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x101}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000001c0)={0xfffffffffffffffa, 0x801, 0x8, 0xffffffff, 0x3e, 0x2, 0x8, 0x1f, r2}, &(0x7f0000000200)=0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x457d10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x3ff, 0x0, 0x101, 0x4}, 0x14) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'wlc\x00'}, 0x2c) close(r1) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0x8, 0x4) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000480)={0x3}) 20:05:31 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x40030000000000, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:31 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x8848, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2978.592948] XFS (loop2): SB sanity check failed [ 2978.602938] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2978.637645] XFS (loop3): SB sanity check failed [ 2978.637932] XFS (loop2): Unmount and run xfs_repair [ 2978.646285] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2978.652312] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2978.682190] XFS (loop3): Unmount and run xfs_repair [ 2978.687719] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2978.731218] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2978.745387] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2978.759805] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2978.780792] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2978.789197] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2978.799855] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2978.808411] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2978.816945] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2978.825592] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2978.833856] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2978.842002] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2978.850274] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2978.858639] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2978.866973] XFS (loop3): SB validate failed with error -117. [ 2978.872874] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2978.881025] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2978.889408] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2978.898257] XFS (loop2): SB validate failed with error -117. 20:05:32 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x406, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:32 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) 20:05:32 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x8100, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:32 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x400300, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:32 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x1e, 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x118) sendmsg(r1, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x101}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000001c0)={0xfffffffffffffffa, 0x801, 0x8, 0xffffffff, 0x3e, 0x2, 0x8, 0x1f, r2}, &(0x7f0000000200)=0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x457d10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x3ff, 0x0, 0x101, 0x4}, 0x14) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'wlc\x00'}, 0x2c) close(r1) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0x8, 0x4) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000480)={0x3}) 20:05:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="78667303", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:32 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 20:05:32 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0xf0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:32 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x2000000, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2979.247902] XFS (loop3): SB sanity check failed [ 2979.253357] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 20:05:32 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x806, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:32 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) [ 2979.350125] XFS (loop3): Unmount and run xfs_repair [ 2979.374459] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2979.385787] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2979.397827] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ 20:05:32 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x3f00, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2979.500242] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2979.552282] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2979.561257] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2979.569660] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2979.579080] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2979.587662] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2979.598279] XFS (loop3): SB validate failed with error -117. [ 2979.728797] XFS (loop3): SB sanity check failed [ 2979.733893] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2979.745343] XFS (loop3): Unmount and run xfs_repair [ 2979.758838] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2979.766788] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2979.776290] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2979.784934] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2979.793537] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2979.801709] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2979.810191] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2979.818678] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2979.827150] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2979.835707] XFS (loop3): SB validate failed with error -117. 20:05:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffff0010, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:33 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x8847, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:33 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="786673fb", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:33 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 20:05:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x8, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, &(0x7f00000000c0)) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, 0x0) r2 = socket(0x19, 0x5, 0xa) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000000)=""/85, &(0x7f0000000080)=0x55) 20:05:33 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x88a8ffff, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:33 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x0, 0x35ea}}, 0x30) 20:05:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x8000}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000140)=ANY=[@ANYBLOB="b0900fbe78903c185367fddebfc624f6cca2450e2f0e1e0fd0761d1fae4caf42e9781b0e534f59e6552d47dfb796bbf597c92c6caf533c4c255568afdb114b"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000040)="ce0f20e06635000100000f22e00f01c9dd7755660f6dcd640fc79e0600f365780066b95c0300000f3266b96806000066b80000000066ba010000000f300f01cb", 0x40}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:05:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0xfffffffd, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:33 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xd00, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:33 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x0, 0x35ea}}, 0x30) [ 2980.174675] XFS (loop3): SB sanity check failed [ 2980.179598] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2980.258942] XFS (loop3): Unmount and run xfs_repair [ 2980.272358] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2980.286573] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2980.295186] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2980.303402] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2980.311600] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2980.319811] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2980.327997] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2980.328009] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2980.328019] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2980.328054] XFS (loop3): SB validate failed with error -117. 20:05:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x1e, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:33 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000040)=ANY=[@ANYBLOB="020300000e0000000000000000000005000600000000000a00000000000000000000000000000000000000e5ff000040000000000000000200010000000000007f5be90000000005000500000000000a00000000000000ff012300000000000004000000000001000000000000000000"], 0x70}}, 0x0) 20:05:33 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x300, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:33 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x4000000, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:33 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x0, 0x35ea}}, 0x30) 20:05:33 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xb00, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:33 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:05:33 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) socketpair$unix(0x1, 0x100000000005, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000240)={0x0, @dev, @dev}, &(0x7f0000000280)=0xc) sendmsg$nl_route_sched(r1, &(0x7f00000003c0)={&(0x7f0000000140), 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=@gettfilter={0x3c, 0x2e, 0xb00, 0x70bd2c, 0x25dfdbfd, {0x0, r3, {0xc, 0xffff}, {0x8, 0xffff}, {0x0, 0xffe0}}, [{0x8, 0xb, 0x9}, {0x8, 0xb, 0x9}, {0x8, 0xb, 0x3f}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20008810}, 0x8040) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vcs\x00', 0xce6c0dd29dd9266a, 0x0) faccessat(r4, &(0x7f0000000040)='./file0/file0\x00', 0x100, 0x1000) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000940)={{}, {}, [], {}, [{}], {0x10, 0x2}}, 0x2c, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') ioctl$VIDIOC_QBUF(r4, 0xc058560f, &(0x7f00000000c0)={0x3, 0x0, 0x4, 0x10000, {0x0, 0x2710}, {0x2, 0xc, 0x8, 0xfffffffffffffffa, 0x1ff, 0x1, "53df1b1c"}, 0x0, 0x3, @planes=&(0x7f0000000080)={0x200, 0x8, @mem_offset=0x6, 0x7f}, 0x4}) 20:05:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2=0xe0000003}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2980.715422] XFS (loop2): SB sanity check failed [ 2980.720332] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2980.753180] XFS (loop2): Unmount and run xfs_repair 20:05:33 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x86ddffff, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2980.765135] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2980.789632] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2980.798760] XFS (loop3): Invalid superblock magic number 20:05:34 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) epoll_create(0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000140)=0x5, 0x4) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0xf) clone(0x0, &(0x7f0000000240), 0x0, &(0x7f00000001c0), &(0x7f0000000040)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f00000000c0)) r2 = add_key(&(0x7f0000000100)='blacklist\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000300), 0x0, 0x0) keyctl$get_persistent(0x16, 0x0, r2) mremap(&(0x7f00002e5000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000fff000/0x1000)=nil) socket$unix(0x1, 0x0, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x101, 0x80000000, 0x800000000000000, 0x0, r0, 0x2}, 0x2c) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000001680)) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000001440), 0x3528acf1}], 0x200000000000000f, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000001440)={0x0, 0x6}, &(0x7f0000001480)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000001640)=ANY=[@ANYBLOB], 0x1) [ 2980.806230] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2980.819646] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2980.832472] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2980.841488] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2980.850334] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2980.908499] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2980.936956] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2980.946253] XFS (loop2): SB validate failed with error -117. 20:05:34 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xfeffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:34 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2=0xe0000009}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:34 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x40000000, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:34 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:34 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x3000000, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:34 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2=0xe0000017}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2981.259936] XFS (loop3): SB sanity check failed 20:05:34 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x7000000, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2981.293717] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2981.410165] XFS (loop3): Unmount and run xfs_repair [ 2981.431858] XFS (loop2): SB sanity check failed [ 2981.436882] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2981.444724] XFS (loop3): First 128 bytes of corrupted metadata buffer: 20:05:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 2981.482738] XFS (loop2): Unmount and run xfs_repair [ 2981.498890] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2981.501713] XFS (loop2): First 128 bytes of corrupted metadata buffer: 20:05:34 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2981.540506] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2981.546574] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2981.565408] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ 20:05:34 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2=0xe0000008}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2981.588499] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2981.627237] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2981.652290] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2981.661466] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2981.689218] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 20:05:34 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000580)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f0000000900)=0x40, 0x4) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x4, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x8202, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), 0x4) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) r3 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = accept4(r3, 0x0, &(0x7f0000000640), 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000740)={'team0\x00', 0x0}) ioctl$PPPIOCGFLAGS(r4, 0x8004745a, &(0x7f0000000240)) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') sendmsg$TEAM_CMD_NOOP(r4, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x880000}, 0xc, &(0x7f0000000180)={&(0x7f0000000a40)={0x3fc, r6, 0x302, 0x70bd2a, 0x25dfdbff, {}, [{{0x8, 0x1, r5}, {0x1e8, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x95}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x3ff}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r5}, {0x134, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x8001}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xffff}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x3, 0x6, 0x9, 0x4}, {0x4, 0xab, 0x9, 0x6}]}}}]}}, {{0x8, 0x1, r5}, {0xb4, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x3fc}, 0x1, 0x0, 0x0, 0x4000}, 0x4008040) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000a00)={0x0, 0x3}, 0x8) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000003300)={{{@in6=@mcast2, @in6=@dev}}, {{@in=@remote}}}, &(0x7f0000003400)=0xe8) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000100)={{0x0, 0xe7}, {0x81, 0xffffffff}}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x2}, 0x48) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000006c0), 0x8) [ 2981.698202] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2981.708107] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2981.718729] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2981.727550] XFS (loop2): SB validate failed with error -117. [ 2981.731572] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2981.742523] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 20:05:34 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xfffffffe, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2981.750743] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2981.760089] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2981.768762] XFS (loop3): SB validate failed with error -117. 20:05:35 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x13000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:35 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2, [0x8]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:35 executing program 0: ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000000)={0x79, 0x0, [0x0, 0x200, 0x100]}) r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0xfffffffffffffe94}, 0xe3c7) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f0000000380)={0x0, 0xffffffff}) r3 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) sched_setattr(0x0, &(0x7f00000003c0)={0x30, 0x1, 0x0, 0x0, 0x5}, 0x0) fcntl$setstatus(r3, 0x4, 0x6100) fdatasync(r2) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000240)={'rose0\x00', 0x7}) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r4) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) write$P9_RREADLINK(r3, &(0x7f00000000c0)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x2, r2, 0xe}) r6 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$setsig(0x4203, r6, 0x5, &(0x7f0000000080)={0x11, 0xeb, 0x9, 0x85}) fcntl$getown(r5, 0x9) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f00000005c0)={0x0, 0x5}) syz_mount_image$iso9660(&(0x7f0000000300)='iso9660\x00', &(0x7f0000000340)='./bus/file0\x00', 0x2, 0x1, &(0x7f0000000540)=[{&(0x7f0000000500)="fcd54724149a755ee95eecb876fe5e229467ef458e53", 0x16, 0x36e1265c}], 0x40008, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x400448c9, &(0x7f0000000100)) r7 = shmget(0x0, 0x600000, 0x104, &(0x7f00009ff000/0x600000)=nil) shmctl$IPC_INFO(r7, 0x3, &(0x7f0000000400)=""/251) 20:05:35 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8864000000000000, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:35 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:35 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x2000000, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:35 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2, [0x80ffffff00000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2982.447248] XFS (loop2): SB sanity check failed [ 2982.458462] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2982.465014] XFS (loop3): SB sanity check failed [ 2982.473612] XFS (loop2): Unmount and run xfs_repair [ 2982.477986] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2982.479951] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2982.491203] XFS (loop3): Unmount and run xfs_repair [ 2982.507019] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2982.514190] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2982.532508] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ 20:05:35 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 20:05:35 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x800e, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:35 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2, [0x80ffffff]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2982.540882] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2982.550901] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2982.560879] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2982.573430] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2982.581771] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2982.613940] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2982.624605] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2982.648482] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2982.657053] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2982.665563] XFS (loop2): SB validate failed with error -117. [ 2982.674750] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ 20:05:35 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x14000000, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2982.749785] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 20:05:36 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="78667303", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) [ 2982.797821] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2982.842210] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2982.863700] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2982.912277] XFS (loop3): SB validate failed with error -117. 20:05:36 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffff10, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:36 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2, [0x8000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:36 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x5c000000, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:36 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tracefs\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x21, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESOCT]) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x1ff, 0x6, &(0x7f0000000640)=[{&(0x7f00000002c0)="7e6370b27ee66a85055217e91918e04f1fe3fb982ee20fc5020039482e3874a1c860b579a3d87234e9c153ca38566a9f30a6a86c3fec404225436a479bdb702700a30683632af14294210fe0053832506df401c17364562fa09f53442355d95389aa50266ec411c6442d130b2ab083f574113bb035565824a26ca68ee6ca4b45aa5b90470a59eda3732f65b3de342f3be3bf795d9aa1f3ab2c2a63c01885162cf4cb3dd944e5cbedbb5018c5fe5e9e8855af9308681723d9f5728bf61dc81380ee93bbc29838a201", 0xc8, 0x4}, {&(0x7f0000000180)="76083d3925e0d23ff7d4f0f9f2649b75d4f3d536bcac1149932b85b33d8e8a13bfcb421ced49ffd003cb9990e7a2d463a4bbd4ad7034e83ff7d5c379", 0x3c, 0x9}, {&(0x7f0000000200)="43a10cd5c1dda95a3eff8ad9be93f27e5ef7d026891db149dcc53749c03bb0ea3f1fb7a4c7dda032e849b4f89db5048b2bcb49300637768778349bf4a4143ad28ca2bb87db355b7bf7e21c0477a52752e21918c2dfc22cd57aad9ea8135d489b2b", 0x61, 0x4b}, {&(0x7f00000003c0)="94290d46b6ea6ecee083a15ef2f5279167d209742c4b68d8f4350bbe0ea1bf89574f40a4029302d55cc2d1afe6c2ffbbbe042b83ad1db3c5c67d7afd6b808b545851a17e77764bd45eb7cd695a5fbad8d9447eb304ee411cdcc20a7c8a6f37a9391968dd5a71c588c186bbab", 0x6c, 0x8}, {&(0x7f0000000440)="55689ea8ac4ce8a9a47f8e40ee0bf73645302aa82c0d8b03165131e0fd41f4f091de1ad9ce2d440f22246467dff16e80c1268eaf78fefe9af885578de8fb65a181f6700cc492f85b5a62e70e6e00873f3c8423b86123b283b98e9641ff301ed30c23eef89e7fab7cb8c438b76f9d4abc2278aa850b89260de188736410fbfc53968822ea10fc2788e2c2661ea8e51349dbbdfe14cf7c02fd150a6c09ddc3ffc93eec5e57adba20c6c7a15c3dc36cd8f9091832cfcb02e5789fe01d81c5c1899fae9803557539b2f2724e39062211", 0xce, 0x7fffffff}, {&(0x7f0000000540)="43bf2a7e8cb504db46168fb227802ab6dc6fd501eda0a32589290e95354b75ca667eacef2215dd68554b9dd4ce602ab431e7d5f373c59bca8ec220a677ed9217d564f598543f4ca97f8cf5c43211443164f989dc28fec65474de249adc7106cf45f519d9701da82ee488ff5fb3904a3ef56fe87e49f283713994572c2db8d6db8c87e016249df813460a7fa1110261f4b54e531f7ee4d394c38ee0d15f2c87bea2517c3e416dfb41d8e584bc4c92e04a03b63bc672eee9ba904614e61aba378644392b9f2c56f2a64ffac6fd1ecb7344e09e47f3b5bdd6", 0xd7, 0x1}], 0x80000, &(0x7f0000000700)={[{@shortname_winnt='shortname=winnt'}, {@shortname_win95='shortname=win95'}], [{@permit_directio='permit_directio'}, {@dont_hash='dont_hash'}, {@seclabel='seclabel'}]}) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000780)='/dev/dlm-monitor\x00', 0x2000, 0x0) inotify_add_watch(r0, &(0x7f00000007c0)='./file0\x00', 0x20000002) 20:05:36 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)="78667303", &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:36 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x700, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) r2 = open(&(0x7f0000000040)='./file0\x00', 0x2000, 0x5c) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f00000000c0)={0x3e1, 0x101, 0x2}) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0xfffffffffffff000) process_vm_readv(r1, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x600}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1f4, 0x0) [ 2983.335952] XFS (loop3): SB sanity check failed [ 2983.345764] XFS (loop3): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2983.371423] XFS (loop3): Unmount and run xfs_repair [ 2983.378253] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 2983.385548] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2983.394387] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2983.402614] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2983.410772] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2983.410785] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2983.410797] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 20:05:36 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xe80, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:36 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2, [0x4]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:36 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x10000004) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d492f66696c65302c776f726b6469723d2e2f66696c65315c0002409891c9119bbf5843b50142440778cd65b7b934114ccf65cc82a936110c3ff9c4e8741605e985229594fd5551c7a133ffd979a07f800c15210430942f59773528ce1e8e650b0780341dbfd8c325a2a9b99f8c7096e0c7b6e4344b907b42880dc9ae6e548b3c86b720abacb392e0a7213a"]) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB=',lowerdir=.:']) write$smack_current(r1, &(0x7f0000000040)='overlay\x00', 0x8) bind$unix(r1, &(0x7f0000000140)=@file={0x1, './file1\x00'}, 0x6e) 20:05:36 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:36 executing program 4 (fault-call:3 fault-nth:0): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) [ 2983.410809] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2983.410820] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2983.410853] XFS (loop3): SB validate failed with error -117. [ 2983.534787] overlayfs: empty lowerdir [ 2983.549017] overlayfs: failed to resolve 'I/file0': -2 [ 2983.555861] overlayfs: empty lowerdir 20:05:36 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x11, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:36 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x3580, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:36 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x3, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000340)) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) syz_open_dev$sndmidi(0x0, 0x0, 0x313000) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) ioctl$KVM_GET_REGS(0xffffffffffffffff, 0x8090ae81, 0x0) gettid() recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f00000002c0)=""/20, 0x14}, 0x100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000880)) bind$inet6(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x448) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, 0x0) write$binfmt_elf64(r1, &(0x7f0000001400)=ANY=[@ANYBLOB="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"], 0xbb8) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000b40)=""/23) 20:05:36 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2, [0x34000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:36 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xfeffffff00000000, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2983.702940] XFS (loop2): SB sanity check failed [ 2983.707636] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2983.740205] XFS (loop2): Unmount and run xfs_repair [ 2983.745443] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2983.753795] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2983.762189] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2983.770461] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2983.779043] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2983.818149] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 20:05:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2, [0xffffff7f00000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2983.861735] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 20:05:37 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x6000000, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2983.924787] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2983.967876] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 20:05:37 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x86ddffff00000000, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2984.009453] XFS (loop2): SB validate failed with error -117. 20:05:37 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000040)='./file0\x00', 0x1, 0x3, &(0x7f0000000140)=[{&(0x7f0000000080)="aecb3ebf7135f188d704b7aa29c1c248a58171c046e4", 0x16, 0x5}, {&(0x7f00000000c0)="b12c", 0x2, 0x100000001}, {&(0x7f0000000100)="8c5da913c825122948edbe78955b2fc8e313", 0x12, 0x8}], 0x2004, 0x0) stat(&(0x7f0000001400)='./file0\x00', &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000014c0)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000015c0)=0xe8) syz_mount_image$iso9660(&(0x7f00000001c0)='iso9660\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x3, &(0x7f0000001380)=[{&(0x7f0000000240)="a832e4134ca24a3c862ba65cb68cf9a02601c661c004035e27c47f8985ea2b0756bb32e08d2093b3e4d981884019c1bd46d70640243b62752e82c1363345528eb36dc77aa0384da91bef3d67eeacf65bb773856ffb5ab8222bf491a8b417fb6ab96ed1b62b63e39d03a5c39fdafa27d7b1bc6372070ec7afbd2f9c63b687131f7fc68410d5761a2684f889fd8008e2d1bb7b7a0f1aa19357bdce964f2bcd3b40933ffb7232cbcc2179a24dfc5334b57a3955c1e5bcc0ccd5dbf7e3ac370cc90eab931503a9d405b62b31c68e5d74e66e529b5706c081e38c7c2d33ae0c0fae643801cb7d1fe43c49bdf3480e8c60979327c624f61620f3bdb3ea5777a5b6c9f69117f13f010cbd90d3f90223ebb2b7d899aa75291ac56faff33f5fb7a886f14a22cf38d76d00fdc8469cda85730a0cc19b541083a72f53938d5d7a01094d2fe2c2766c359a9b708a434d1026423ac686ac72458b9f42e20749a85fd447b562da78eb500173faceec5777840ceb3d24c41928c25cf2b11a0448b0595580811b62e4de999555db2b460fffad936225bc9c1266a32e7dad33dcdc2d43e4779d7ee85be99fef437f80f5081b7ff60ecf14bb278fda1841e9b4b7ac92370df88bba1cec050dd5e66f5f30fefacdcc7862d6d1bb5ab3bd53b8305d6268599121139f893051c8c4bd726927cfed3d2cce75a250957205cf49c540715fa1d15d7c3eb2478ae88f4472925916b4a9000642e3763b2c829fc943b9b6e7529541a7a55c73fdbdf3d1409730d3726120c3fa46a14579b082e2c4351714c6ed59c522723283a11cca1cf4979077ff80f8eef0e57ff29943135081f0e9d6d8c4569d0485d71e6eb89086912de97f6832ef041661415588db3f4c10057758f5b0d6000af716447b7f4b08507c8665ffddca389a6f413f613aea1ebed0b8505ac9d036e0d9b4b46f09d9e04367ca574ecb1a9431906df8365ce1599a4afba2acea99c3330e093ace29f946057c2487b75c7032110720626bd8507814e3ae1f1d609a5e83548c815697406a89346ddeb555ec66d99a04e55b05aa61e26551ca26f6663c69fa0ab5359090e4389b15e6b913ac9e259232b9eb9d4bcd4c053e68350d985537120cf221ce4186489e496fe21918239e1b8bcbc59914f992c27abd509f94cecf0af5057d7b7b0001a97161d1b93567518309c5aa6840c033148a4d2be9d87093a7af7583b03552518dae7aaad2c67a88b63dafb8192db9a1579d9973a892a6ad9c538b78581317ba11033f9e928a5c741503d8dfd090cfb07fd01af25d58cb41e79e2401d8a620b859414394a7d9f7781b9f3a60e24f64808649d2a0f72befdce6f2477121ace2cd9418e7f9236fa6af7033cd53f7ec5539b79629cf67b6c5b3932382474972e5cef00ff52e1c0d2ec0a9102894bc3a6ee736684abbe298d0dd7718ed4044a499a562e647d241765c4a380ec5ddc46aa826214fcc934c4aba97b04c4ea5f1aa20b4bb656e6630db64ce9ae8deae7b82ffd901cfa6d14a72aa45b2bb15fb1761d9b7042ca18d3dddc19d44ad459af0804b49c6eae2c0738b92e49035514f93f78533c66ea102d4eadfb2771deaa20650ff960b4396cc3f146e1fe52a3b6cabea6e50d12b10fb936b8ded4ee2cc3cfb3ad84cd125c92cf857adcea699a5f4aaed856740f7d09beb4b48b1c1d9386715282710a2301a07eb44de7d4f390ef3f168e0926905b2058ffc42501d3c7b23b06ebde844ed0e97d024799dc6b5af4d9fff3cd2bf1d96069aa05035f4d285bd326830b6864069beff53ed08745d7f326d9c7ed6b28eb616d577ca614b6f4e49219e3ee4a00492316c05a96b5473ddefd60a70254ba80729037f5cc2b712b827f669bf0463da82ce018e5eb85a1b3e75eee60b3447df84fbbdb04b444a97161aa679433e09cf5398f37946bca8f9e2d62ad4b9e65fada4f66c11b025174921ee9b60448b712ea4af9a2a21f1bf693fb8e38c989ddf7a26afe563b38aabb0efd481a57d31ca8e7bb090623a98e2536047b8fb3b82bd33f7836160a930d86b440e356b2099f28d22ba745bdfef60375de99c687ab5be1cdaeccd65cd95bafff22721aa09383003785b9736a9dea3a9b4d337c729ceec838ca0222c988fa19e957fde6fb0bca3da10f35e65e238d318d45d6352208af8c9d51198f7cc08a7aebe6281d21c041f842eae42c453b05393e070f6046cd3fc88feb5a012b51a9e22c7d4dc2c4328bb74786fe0c832efe53a590199db38af1458099fdb304e07c983b0fbb05dcd429c919a67938e8ec35c37d85bbe3f1ea62450a1950e50c47fca6ed6a740d3fbda362b40f14126a8617166ee1299bc15fff0df95d48afef9bcda9d18bb3ae366996d854c70218fa96545c0ac07355a5d825d6c1cb88d52007e4528ee50c80345026da0f36a0ff444396629bbd706bb9ee608938ff6a4530e560d4ad964399bfe86f854e91a003c85b2bff56c9e128ffbda6340ff0cc62523f8c16fe5af0e0f13faf4b6b084f8cffa3e2847933f6c63d6f0b37476fb3ea716a3110c80e9868b62c2ba12d0c05676741c42b6a1afca6265860ad289bdaa841571edcfb691dfb3edb0c10b20ced91ab07bd04d6f66d418ff0346527b121030fe27c26af78c69ca92bef07e1709f3c938c26549b51d982f337fd053a870de5defd932ab81f9f9fd24bfabb7820d9ab8bb18f2a85dadb2b1f846833d5543709de85f73298de57c58c179da73ae9762e8b753d8191306a14517ad79f1800a216dd3f3fd5bda528079996651b0040f32d30ea87828fe192582eaa4af11965f7cc0195c82871856384a460f15ac422a21c645cdc04d02bdf1d239de001e04ce7eb3c63063afc9ee4390c1c669dff08f6e01be054c21b79dab4a92d12eec3911e4a2ffd3aa6c56c8ab8cfdc87ed52eea561e9777da6ff51c51014021df95ff9e26230b2e1c35dec25ad49a958a822d21f35463b81aa2a3ed590882d9344dab42fa72aa521965cc4ed684d5a3de5645d978f268d13f96c85bde8a548a88c58faf00bfd2e07023ab37f0b5345304fe01ea35320e436c131c77fe65d12047a96c232050d2593ab97d3adaf6dab4bafcad350ca28dce9acd2b27c0b408d5d1e31289c8b0f081d78814c4646f87b33f14591498af30302ad5b699929f1fbeb6f246135ff652d9164fcf3fed205d20cff003d78624218bc2719ab1134d4937efaa81cd291a821f6ad9083da0576ca6644d8f255d27190bf10fb6ff49a1121f3286987de16f80032e3b7280a1f04dff712157490629db65fc66435c834a73055c0eccd33e6475a4c1b4d42eb750873976c8afffdaabd6ca2388d3f15255affdd5898ff446174d25280052b1fd6c02778fe4d1a412f5b0d299aca539b1ac758817545184818f967addbf804fe6404d0e9c5986e52674db159612d27699553c3e258ebcab6f4aa3fb1223a4fb2beb16922b6877463ed0cba3a6aa205152d9fa2006350ebd650ac94f38915995f15273f854e9ed0553007355ca8da6acf397ef5706e8853772878963dbaccfb096b65eca753900e1cb1b0e448174fc81f1e666e05e253473756f8495b45056160ad4c624aa9d42e3b6e06e5a387de0aa83b705e598e557b193311b1767cc613778e20763cf3795ca51ef17f82b2c5497028c94fd110881d3091f855eed14bd7ba7ca5988b29f38ee99833135f2c471c500f12e88587a972eb3a0dc3979ed771781131b19ddc619fef5041c9947e09dfdfb8f3e3164c9f6b64612c85b3ff07550c5ae75f45e463fa7a2180671ead3dcd15027612ca49cf7ac0931a3f74a75d42c4a34ebc6c153afb000d303bd9eb510fd03aec44adfd7ab72b8e823e40873f8f6d6277dd8764c0f87afcedc09e601ec371f46ddfcbee498edc525e0e47875c4966128eaf35607d3ba6980caf676f723ce1667d6a574e25c20319e7448fefeaed777cb9b21dd0b5a4016023d1f62df7717cb12a99808bd270a94a66245e24d42441a0a6a45faf1f9ef61c36246ed1e65f3d698a0be56164bf5c0a3c82e47fb6b42b75fad64ed14e007f82aaa48d087c6d0c9f1014833336c61081ca29c0ffb01111d6c9793d5e8a0f556cdaccd4830ecc0b893324e9f7544fa6d75084ad4b9603fee488fb052bb13fcdf2278c5c1824cf89a39b3d2022b197d0b17bdc825be019421d861d7f5549cd258dffcc7801e662782f932c1505047f6c74df82bbdf0660e6a0625542fb17bbd6869bbbc91aeaca9a34cb0942dc7d091164649bac96650d3786c547a5545cabf62a03a77f64beb5eec9d66108212b342050d7cdd191bf34eb92cf9020eeb299af1fc411bf21e5001b071eca256ebc9c04be05276b0bc75696a3f0bfe81f5c27a0a08fc2cd288f935db0962702d7f296c77ea273df2bccefbaa346316f757f71610cfe84aa2447c5d281e400b89218856767dbf5f98279ed0a49015ace6751622427676db1aefa585c9235230782c99332671e41399aa6865a3c0f70286343f95ea846e3477295063cb8246a1b8d38f1c1c658165da7efef3c3f4c165723b19b3003d4db08c968402855060ba528c824f72341876b4f835e73a9e120f87694f3dfbe4e63f0b5bed629ea837891e2567c2cf31c4faad06fe725719400edb6c6f72a91db7348da537a1fbda99f9164df2d3f0069885eccb783592d764286431c2b31608ca1a922a19f6fc7e76d9dab95ee28214e14a8eea1526292d4a62ee6673788f28ea38779df494af483bcae21ae3889febec74a2971f5b5dc6fdb878003a93ec42e19d35168be46381dad7f9537828b48518e648511bf428c33f1d17e3629f59b49c223f103f69e24e281d690d7fabc9a4bc59285c33c08f33684c22721cfbf788b7d131ff9e3efd437f4d18d12a0038b2b2b62fe36b08c378e733b599db8747c7ae51eca04fc8e5c53df499de9c21cfa3d95cab8ea8a16f1de336a2f281d81d1f0161a7a1b8ee7b6dedb184cb63bcb3042ebbf86c9adcab2d588945312247e447f7867df9ff99ab0beb4339f4e97b8967e5ddf28f3a59795db18e4db21f4ab3edcd19a353f2fa2ec498b479ab2889000e34880bf93883fc22d3a58a5676c74b3dd172f83b94b873d9c2772abef789bfd8e2b49ec7716d0104c2900facd94628da63e2c08df50bf9c4d77fcb2b433fa0691ffab8286544105d83e8c322ee6924f6a00b059852cc6614659609e0a4ae80ab2a4ddfb47aaaa9ee4caa122c878ab3c5d08ee221920ec9f2a495cb4bde93e61fc6aa8e00fa4873605a76a40fe83acf20fc55faac409327048371553ef05205072746798a71f358fa712369b001de98457ef44b511371c4c14d5c633c26a74a01339b0b0f065baf727073e6c4604d402138a6e549d0655ff1ce115dd44d3fad65acd1047cedc38e6d715d7e52a7eab8d61772747691bfa9da17041acf02927ecc638211d93a2d9941d41f1ec8e9236ee74d40e4f85cd72c33acf1cbf21846f80f387e79f7adecd1b3e89de39931a1a6770c7059d6696c479afdd8dd0180ca4cc15f50ae38c388e25eec3bb18dde59486b84b224d11f61c387365ea12104707e05402ef61bbf7cfab17753fc7c5933d66ae4a1ebd44929f2e4b82fc5f6b42676a03a7226017df0d5c7aa1d9606decbd5c7bcfcc019e55ec94e3753ca1c379dbfe80745a716a0695766229b55b7de4906a2296657b9f454428117da31e95bcb83559fa6507e11a3a52d0e6fce7f381e3002d3649aaa4e049f2ebf894510c49900f3d76789505294de462584ab385c95065bb799725444d2", 0x1000, 0x1}, {&(0x7f0000001240)="778d9233c2011c1800dc8d11baf69ca81fb1802e0b24cac8b59b86f258eb82849c279da246ad7ed4070484bdf122ed39fd8ef096b578799059f7bdf62192cd14ba088c54ffff942fe2c9f9294a8afd4b33b71adb03a3a033f24c7a1266e7d917df677df48fab5d551b84962dc1b418e84fae5078", 0x74, 0x3}, {&(0x7f00000012c0)="28a112f306180bb91e83695c414a2eb475c7db9e3cdd00da83fa001b0c77b5ac477648da457f35f5c17525255ef6bb4d36fa75b8865c9360f30ddefae3077dbcfc2b7cf9665ef530ef091bd1639d428f2b2a07b8740f9054e481c8e38ddb954ac2dabbad121e3df7ac616595f2c165faa564982d4b94bafd49d213c9e4799861b87ac39b8b619c2da13124e4479ccdf9efcbba3ef90dbd0b867e13148eddc22ae974f71d43f220e41b3a1a2b2678280bfad81c4bcfc5bd5f43888f7de4", 0xbd, 0x5c87}], 0x850, &(0x7f0000001600)={[{@norock='norock'}, {@block={'block', 0x3d, 0x800}}], [{@permit_directio='permit_directio'}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@smackfsroot={'smackfsroot', 0x3d, 'minix\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, "2ecf3a212b6c6f3a2c637075736574706f7369785f61636c5f61636365737373656c665b73797374656d7b"}}]}) r3 = fcntl$dupfd(r0, 0x0, r0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000017c0)={@rc={0x1f, {0x3, 0xffffffffffffffff, 0x5, 0x9}, 0x1}, {&(0x7f00000016c0)=""/162, 0xa2}, &(0x7f0000001780), 0x2}, 0xa0) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) syz_mount_image$iso9660(&(0x7f0000001880)='iso9660\x00', &(0x7f00000018c0)='./file0\x00', 0x100000000, 0x5, &(0x7f0000001b80)=[{&(0x7f0000001900)="e0bafd0d32a1e59103c594f9ea18388a1ee5d421b416097d625cb1d7fd25b8330ad09ab8f32f3c74f4f349b6e4682fc5a7e8943fe9e1e5d0b894c7cc", 0x3c, 0x2db}, {&(0x7f0000001940)="0533411ad434ef7639c4eb2774578fe9b1455fc4e3ffe58e923066ce9bf4e0c2ab40", 0x22, 0x100000000}, {&(0x7f0000001980)="267985b3b26c242269fb6a575d0f39060b22aae6edc9edd1f59c476cc0706e63dd5fedda50fd9d39e417290c89b593810f761750148f21a27963cdd166b7f069e808cfd11b069b0bdf4953439c5f0cb7abb4", 0x52, 0x6}, {&(0x7f0000001a00)="0cf974fdd1cb9ae19722ecaeee38f5e75d3b371eae290af7c29a905c98e0c432c5c8258ebd8910e9b6b0332619aedea76f1892d940af094697c329072d5e6b70cf21eacbbcb0f8dde6790698ffdac2f3ceafcb4eb67a194910dbd928269ad146dd79ba8a004e7ecdaa5565064e7a6ba055ae4bd62a94c04c4c2d6d34759fcd0266db96be5baa2432991bddde83a161e34cf818371206bedbf32f9589f66e51e643f714736b555b4f42931124b4cc24666841eddd1dbc744cfe96d18377298466f18be83b91080c9d26e81a13d42c289390ceaea8e037d87e52d428", 0xdb, 0x7ff}, {&(0x7f0000001b00)="6372747e5390a4dfdf8f3d406640aba033ea11031936a0cea1cd50c9b8d15a781eae3d3fa4682b50e629be24ce3c10eba3b709f5eed265815b7e501f5fb70d00a69455964b8bf6f9e53740ee64f88cc97d922bf8e1bad867b40468858eb65d1a", 0x60, 0x7}], 0x2021, &(0x7f0000001c00)={[{@norock='norock'}, {@nojoliet='nojoliet'}, {@iocharset={'iocharset', 0x3d, 'cp857'}}, {@iocharset={'iocharset', 0x3d, 'maciceland'}}], [{@smackfsdef={'smackfsdef', 0x3d, 'block'}}, {@smackfsdef={'smackfsdef', 0x3d, 'ppp0{'}}, {@obj_role={'obj_role', 0x3d, 'em0'}}, {@subj_role={'subj_role', 0x3d, '}'}}]}) get_mempolicy(&(0x7f0000001c80), &(0x7f0000001cc0), 0x401, &(0x7f0000ffc000/0x2000)=nil, 0x1) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000001d00)=0x1, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001d40)={0xffffffffffffffff}) ioctl$VT_DISALLOCATE(r3, 0x5608) r5 = socket(0x2, 0x0, 0x7) link(&(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='./file0\x00') ioctl$EVIOCSKEYCODE(r3, 0x40084504, &(0x7f0000001e00)=[0xfffffffffffffff9, 0x80000001]) ioctl$EVIOCGMTSLOTS(r3, 0x8040450a, &(0x7f0000001e40)=""/4096) r6 = syz_open_dev$mouse(&(0x7f0000002e40)='/dev/input/mouse#\x00', 0x4, 0x14001) connect$bt_l2cap(r5, &(0x7f0000002e80)={0x1f, 0x2, {0x20, 0x8, 0x1, 0x400, 0x4, 0xdc5}, 0x7, 0x4}, 0xe) ioctl$TUNGETSNDBUF(r6, 0x800454d3, &(0x7f0000002ec0)) ioctl$ION_IOC_HEAP_QUERY(r6, 0xc0184908, &(0x7f0000002f40)={0x34, 0x0, &(0x7f0000002f00)}) setsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f0000002f80)=0x8, 0x4) recvmsg(r0, &(0x7f0000003140)={0x0, 0x0, &(0x7f0000003000)=[{&(0x7f0000002fc0)=""/43, 0x2b}], 0x1, &(0x7f0000003040)=""/244, 0xf4, 0x3}, 0x123) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r6, 0x10e, 0x8, &(0x7f0000003180)=0xe53, 0x4) ioctl$KVM_GET_PIT(r4, 0xc048ae65, &(0x7f00000031c0)) arch_prctl$ARCH_SET_GS(0x1001, 0x3) write$selinux_attr(r6, &(0x7f0000003240)='system_u:object_r:var_t:s0\x00', 0x1b) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000003280)=0x80) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000032c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_FD(r7, 0x4c00, r5) 20:05:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2, [0x2000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2984.084019] XFS (loop3): Invalid superblock magic number [ 2984.169711] XFS (loop2): SB sanity check failed [ 2984.192543] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2984.239267] XFS (loop2): Unmount and run xfs_repair [ 2984.244401] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2984.251083] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2984.272255] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2984.283130] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2984.291284] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2984.299597] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2984.307806] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2984.315988] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2984.324190] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2984.332424] XFS (loop2): SB validate failed with error -117. [ 2984.380345] FAULT_INJECTION: forcing a failure. [ 2984.380345] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2984.393188] CPU: 1 PID: 15848 Comm: syz-executor4 Not tainted 4.20.0-rc5-next-20181207+ #163 [ 2984.401761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2984.411159] Call Trace: [ 2984.413748] dump_stack+0x244/0x39d [ 2984.413765] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2984.413789] should_fail.cold.4+0xa/0x17 [ 2984.413816] ? find_held_lock+0x36/0x1c0 [ 2984.413832] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2984.413849] ? __unlock_page_memcg+0x53/0x100 [ 2984.413864] ? lock_downgrade+0x900/0x900 [ 2984.413879] ? check_preemption_disabled+0x48/0x280 [ 2984.413897] ? kasan_check_read+0x11/0x20 [ 2984.413914] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2984.458815] ? rcu_read_unlock_special+0x370/0x370 [ 2984.463730] ? mem_cgroup_hierarchy_write+0x230/0x230 [ 2984.468929] ? print_usage_bug+0xc0/0xc0 [ 2984.472981] ? __unlock_page_memcg+0x70/0x100 [ 2984.477483] ? unlock_page_memcg+0x2c/0x40 [ 2984.481731] ? page_remove_rmap+0x22e/0x1a30 [ 2984.486129] ? page_add_file_rmap+0x1470/0x1470 [ 2984.490784] ? __lock_acquire+0x62f/0x4c20 [ 2984.495038] ? __lock_acquire+0x62f/0x4c20 [ 2984.499271] __alloc_pages_nodemask+0x366/0xec0 [ 2984.503922] ? __alloc_pages_slowpath+0x2e00/0x2e00 [ 2984.508924] ? is_bpf_text_address+0xac/0x170 [ 2984.513454] ? kasan_check_read+0x11/0x20 [ 2984.517593] ? page_mapcount+0x3b5/0x5d0 [ 2984.521649] ? fault_around_bytes_set+0x90/0x90 [ 2984.526300] ? rcu_softirq_qs+0x20/0x20 [ 2984.530257] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2984.535791] alloc_pages_current+0x173/0x350 [ 2984.540216] __get_free_pages+0xc/0x40 [ 2984.544129] __tlb_remove_page_size+0x2e5/0x500 [ 2984.548827] unmap_page_range+0x11fb/0x2930 [ 2984.553167] ? vm_normal_page_pmd+0x510/0x510 [ 2984.557644] ? kasan_check_read+0x11/0x20 [ 2984.561771] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2984.567045] ? rcu_read_unlock_special+0x370/0x370 [ 2984.571953] ? rcu_softirq_qs+0x20/0x20 [ 2984.575917] ? unwind_dump+0x190/0x190 [ 2984.579792] ? is_bpf_text_address+0xd3/0x170 [ 2984.584271] ? kernel_text_address+0x79/0xf0 [ 2984.588724] ? __kernel_text_address+0xd/0x40 [ 2984.593201] ? unwind_get_return_address+0x61/0xa0 [ 2984.598124] ? save_stack+0xa9/0xd0 [ 2984.601741] ? save_stack+0x43/0xd0 [ 2984.605381] ? __kasan_slab_free+0x102/0x150 [ 2984.609786] ? kasan_slab_free+0xe/0x10 [ 2984.613772] ? kmem_cache_free+0x83/0x290 [ 2984.617919] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2984.623436] ? uprobe_munmap+0x14c/0x450 [ 2984.627513] ? get_signal+0x8b0/0x1980 [ 2984.631409] ? do_signal+0x9c/0x21c0 [ 2984.635126] ? uprobe_mmap+0x1130/0x1130 [ 2984.639183] ? trace_hardirqs_off+0xb8/0x310 [ 2984.643590] ? kasan_check_read+0x11/0x20 [ 2984.647762] ? do_raw_spin_unlock+0xa7/0x330 [ 2984.652167] ? trace_hardirqs_on+0x310/0x310 [ 2984.656571] ? find_held_lock+0x36/0x1c0 [ 2984.660627] unmap_single_vma+0x19b/0x310 [ 2984.664759] unmap_vmas+0x252/0x3d0 [ 2984.668370] ? zap_vma_ptes+0x110/0x110 [ 2984.672336] ? rcu_pm_notify+0xc0/0xc0 [ 2984.676245] ? kasan_check_write+0x14/0x20 [ 2984.680478] exit_mmap+0x2be/0x590 [ 2984.684016] ? __ia32_sys_munmap+0x80/0x80 [ 2984.688229] ? __khugepaged_exit+0x455/0x6a0 [ 2984.692642] ? __might_sleep+0x95/0x190 [ 2984.696629] mmput+0x247/0x610 [ 2984.699805] ? lock_downgrade+0x900/0x900 [ 2984.703945] ? set_mm_exe_file+0x200/0x200 [ 2984.708182] ? kasan_check_read+0x11/0x20 [ 2984.712317] ? do_raw_spin_unlock+0xa7/0x330 [ 2984.716710] ? do_raw_spin_trylock+0x270/0x270 [ 2984.721288] ? up_read_non_owner+0x100/0x100 [ 2984.725695] ? __down_interruptible+0x700/0x700 [ 2984.730347] do_exit+0xdeb/0x2620 [ 2984.733797] ? find_held_lock+0x36/0x1c0 [ 2984.737871] ? mm_update_next_owner+0x990/0x990 [ 2984.742547] ? __lock_acquire+0x62f/0x4c20 [ 2984.746763] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 2984.751845] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 2984.756960] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2984.761542] ? __lock_acquire+0x62f/0x4c20 [ 2984.765779] ? trace_hardirqs_off+0xb8/0x310 [ 2984.770188] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2984.775728] ? mark_held_locks+0x130/0x130 [ 2984.779960] ? call_rcu+0xb/0x10 [ 2984.783310] ? trace_hardirqs_off_caller+0x310/0x310 [ 2984.788397] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2984.793916] ? check_preemption_disabled+0x48/0x280 [ 2984.798922] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2984.803517] ? rcu_is_watching+0x30/0x30 [ 2984.807568] ? graph_lock+0x270/0x270 [ 2984.811399] ? kzfree+0x28/0x30 [ 2984.814691] ? kzfree+0x28/0x30 [ 2984.817952] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2984.823487] ? graph_lock+0x270/0x270 [ 2984.827284] ? find_held_lock+0x36/0x1c0 [ 2984.831331] ? memset+0x31/0x40 [ 2984.834605] ? find_held_lock+0x36/0x1c0 [ 2984.838656] ? get_signal+0x95b/0x1980 [ 2984.842526] ? _raw_spin_unlock_irq+0x27/0x80 [ 2984.847016] ? _raw_spin_unlock_irq+0x27/0x80 [ 2984.851494] do_group_exit+0x177/0x440 [ 2984.855379] ? trace_hardirqs_off_caller+0x310/0x310 [ 2984.860474] ? __ia32_sys_exit+0x50/0x50 [ 2984.864550] get_signal+0x8b0/0x1980 [ 2984.868286] ? ptrace_notify+0x130/0x130 [ 2984.872334] ? proc_fail_nth_write+0x9e/0x210 [ 2984.876811] ? proc_cwd_link+0x1d0/0x1d0 [ 2984.880869] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2984.886389] ? iov_iter_init+0xe5/0x210 [ 2984.890377] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2984.895912] ? __vfs_write+0x121/0xab0 [ 2984.899824] do_signal+0x9c/0x21c0 [ 2984.903420] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2984.908959] ? check_preemption_disabled+0x48/0x280 [ 2984.913958] ? setup_sigcontext+0x7d0/0x7d0 [ 2984.918267] ? task_work_add+0x123/0x1e0 [ 2984.922317] ? exit_to_usermode_loop+0x8c/0x380 [ 2984.926969] ? exit_to_usermode_loop+0x8c/0x380 [ 2984.931635] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2984.936200] ? trace_hardirqs_on+0xbd/0x310 [ 2984.940504] ? do_syscall_64+0x6be/0x820 [ 2984.944552] ? fput+0x130/0x1a0 [ 2984.947837] exit_to_usermode_loop+0x2e5/0x380 [ 2984.952410] ? __bpf_trace_sys_exit+0x30/0x30 [ 2984.956919] do_syscall_64+0x6be/0x820 [ 2984.960792] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2984.966152] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2984.971120] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2984.975953] ? trace_hardirqs_on_caller+0x310/0x310 [ 2984.980949] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2984.985949] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2984.990960] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2984.995796] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2985.000967] RIP: 0033:0x457569 [ 2985.004171] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2985.023079] RSP: 002b:00007f35465d9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2985.030812] RAX: fffffffffffffffc RBX: 00007f35465d9c90 RCX: 0000000000457569 [ 2985.038067] RDX: 0000000000000030 RSI: 0000000020000180 RDI: 0000000000000003 [ 2985.045344] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2985.052613] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35465da6d4 [ 2985.059866] R13: 00000000004c56de R14: 00000000004d95f0 R15: 0000000000000004 20:05:38 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:38 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xfffff000, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:38 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000440)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x3}}, 0x7) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000002c0)={0xffff0002, 0x1a, 0x1700, {0x0, &(0x7f0000000280), 0x0, 0x0, [0x0, 0x0, 0x0, 0x11]}}, 0x20) 20:05:38 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x13, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:38 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2, [0x3f00]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:38 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) 20:05:38 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8847, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:38 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(0x0, &(0x7f0000001ffb)={'\x00\x00\b', 0xffffffffffffffff, 0x4c00000000000000}, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x1) r0 = memfd_create(0x0, 0x0) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'trusted.', 'vboxnet0wlan0)eth1trustedeth1proceth1\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000700)={0x14, 0x1d, 0x2000000000001, 0x0, 0x0, {0x7e}}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffd}, 0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) 20:05:38 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2, [0x100000000000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:38 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x14, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2985.280553] XFS (loop3): Invalid superblock magic number [ 2985.335493] XFS (loop2): SB sanity check failed [ 2985.340635] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2985.377189] XFS (loop2): Unmount and run xfs_repair [ 2985.391971] XFS (loop2): First 128 bytes of corrupted metadata buffer: 20:05:38 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x543, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:38 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2, [0x400300]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2985.420148] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2985.458316] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2985.473946] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2985.487981] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2985.506129] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2985.520301] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2985.586595] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2985.614803] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2985.654064] XFS (loop2): SB validate failed with error -117. 20:05:39 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:39 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="5846534208010200000000000000100000000000000080000000000000000000984f0b5042b64b06bc86cba3e6cc3f8000fffffff600004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402", 0x67}], 0x0, 0x0) 20:05:39 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x800e000000000000, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2, [0x3f000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 20:05:39 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8035000000000000, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x30000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:05:39 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x200001b0, 0x5, 0x0, {0x0, 0x1, 0x35ea}}, 0x30) 20:05:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2, [0xfffffffd]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x2c0, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) [ 2986.076145] XFS (loop3): Invalid superblock magic number [ 2986.264482] XFS (loop2): SB sanity check failed [ 2986.272834] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 2986.288471] XFS (loop2): Unmount and run xfs_repair [ 2986.298866] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2986.307321] 00000000: 58 46 53 42 08 01 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 2986.319468] 00000010: 00 00 00 00 00 00 80 00 00 00 00 00 00 00 00 00 ................ [ 2986.328171] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2986.337431] 00000030: 00 ff ff ff f6 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2986.375610] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2986.388701] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2986.397282] 00000060: 00 00 06 c0 b4 a4 02 00 00 00 00 00 00 00 00 00 ................ [ 2986.406018] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2986.414659] XFS (loop2): SB validate failed with error -117. [ 2988.332177] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 2991.342133] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 2994.352158] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 2997.362130] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3000.372128] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3003.382149] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3006.392133] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3009.402129] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3012.412177] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3015.422130] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3018.432129] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3021.442134] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3024.452157] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3027.462133] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3030.472130] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3033.482125] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3036.492133] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3039.502130] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3042.512145] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3045.522130] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3048.532342] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3051.542126] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3054.552131] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3057.562122] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3060.572123] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3063.582177] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3066.592127] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3069.602129] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3072.612211] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3075.622127] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3078.632132] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3081.642133] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3084.652123] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3087.662132] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3090.672126] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3093.682144] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3096.692130] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3099.702128] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3102.712132] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3105.722127] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3108.732146] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3111.742159] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3114.752169] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3117.762134] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3120.772354] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3123.782157] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3126.792128] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3129.802131] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3132.812154] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3135.822144] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3138.832123] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3139.252272] INFO: task syz-executor0:6078 blocked for more than 140 seconds. [ 3139.259556] Not tainted 4.20.0-rc5-next-20181207+ #163 [ 3139.265756] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3139.274153] syz-executor0 D18016 6078 1 0x00000004 [ 3139.279828] Call Trace: [ 3139.288758] __schedule+0xa41/0x21e0 [ 3139.292983] ? find_held_lock+0x36/0x1c0 [ 3139.297071] ? __sched_text_start+0x8/0x8 [ 3139.301277] ? lock_downgrade+0x900/0x900 [ 3139.305815] ? check_preemption_disabled+0x48/0x280 [ 3139.310857] ? graph_lock+0x270/0x270 [ 3139.315979] ? kasan_check_read+0x11/0x20 [ 3139.320162] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 3139.325809] ? find_held_lock+0x36/0x1c0 [ 3139.329898] ? __mutex_lock+0xafa/0x16f0 [ 3139.334310] schedule+0xef/0x370 [ 3139.337887] ? __schedule+0x21e0/0x21e0 [ 3139.341976] ? kasan_check_read+0x11/0x20 [ 3139.346471] ? do_raw_spin_unlock+0xa7/0x330 [ 3139.350893] ? do_raw_spin_trylock+0x270/0x270 [ 3139.355848] ? ww_mutex_lock.part.8+0xf0/0xf0 [ 3139.360355] ? mutex_destroy+0x200/0x200 [ 3139.364839] schedule_preempt_disabled+0x13/0x20 [ 3139.369614] __mutex_lock+0xaff/0x16f0 [ 3139.374024] ? vfat_lookup+0xf1/0x640 [ 3139.377853] ? mutex_lock_io_nested+0x1570/0x1570 [ 3139.383099] ? check_preemption_disabled+0x48/0x280 [ 3139.388147] ? kasan_check_read+0x11/0x20 [ 3139.392724] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 3139.398028] ? rcu_read_unlock_special+0x370/0x370 [ 3139.403303] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3139.408861] ? d_alloc_parallel+0xb7c/0x1f40 [ 3139.413657] ? graph_lock+0x270/0x270 [ 3139.417508] ? __d_lookup_rcu+0xaa0/0xaa0 [ 3139.421665] ? graph_lock+0x270/0x270 [ 3139.425910] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3139.431468] ? graph_lock+0x270/0x270 [ 3139.435668] ? graph_lock+0x270/0x270 [ 3139.439508] ? find_held_lock+0x36/0x1c0 [ 3139.444981] mutex_lock_nested+0x16/0x20 [ 3139.449066] ? mutex_lock_nested+0x16/0x20 [ 3139.453636] vfat_lookup+0xf1/0x640 [ 3139.457331] ? __lockdep_init_map+0x105/0x590 [ 3139.461865] ? vfat_find_form+0x120/0x120 [ 3139.466406] ? lockdep_init_map+0x9/0x10 [ 3139.470502] ? __init_waitqueue_head+0x9e/0x150 [ 3139.475512] ? init_wait_entry+0x1c0/0x1c0 [ 3139.479870] ? lock_acquire+0x1ed/0x520 [ 3139.484198] __lookup_slow+0x2b5/0x540 [ 3139.488101] ? vfs_unlink+0x510/0x510 [ 3139.491951] ? path_init+0x1ed0/0x1ed0 [ 3139.496539] ? path_init+0x1538/0x1ed0 [ 3139.500448] lookup_slow+0x57/0x80 [ 3139.504304] walk_component+0x92b/0x2590 [ 3139.508379] ? trace_hardirqs_on+0xbd/0x310 [ 3139.513161] ? check_preemption_disabled+0x48/0x280 [ 3139.518199] ? path_init+0x1538/0x1ed0 [ 3139.522097] ? trace_hardirqs_off_caller+0x310/0x310 [ 3139.527615] ? pick_link+0xaf0/0xaf0 [ 3139.531335] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 3139.536756] ? set_root+0x42b/0x810 [ 3139.540409] ? vfs_mknod+0x800/0x800 [ 3139.544457] ? trace_hardirqs_on+0xbd/0x310 [ 3139.548794] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 3139.554451] ? path_openat+0x220/0x5150 [ 3139.558462] ? trace_hardirqs_off_caller+0x310/0x310 [ 3139.563912] ? debug_mutex_init+0x2d/0x60 [ 3139.568079] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 3139.574917] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3139.580494] ? security_inode_permission+0xd2/0x100 [ 3139.585899] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3139.591571] ? vfat_hashi+0x14d/0x390 [ 3139.595779] link_path_walk.part.40+0xa61/0x1530 [ 3139.600550] ? lookup_open+0x1b90/0x1b90 [ 3139.604969] ? walk_component+0x2590/0x2590 [ 3139.609320] ? find_held_lock+0x36/0x1c0 [ 3139.613763] ? check_preemption_disabled+0x48/0x280 [ 3139.618816] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3139.624695] ? percpu_counter_add_batch+0x141/0x190 [ 3139.629742] path_openat+0x270/0x5150 [ 3139.633895] ? rcu_softirq_qs+0x20/0x20 [ 3139.637887] ? unwind_dump+0x190/0x190 [ 3139.641812] ? graph_lock+0x270/0x270 [ 3139.646002] ? path_lookupat.isra.43+0xc00/0xc00 [ 3139.650776] ? unwind_get_return_address+0x61/0xa0 [ 3139.656065] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 3139.661098] ? expand_files.part.8+0x571/0x9a0 [ 3139.666140] ? find_held_lock+0x36/0x1c0 [ 3139.670226] ? __alloc_fd+0x347/0x6e0 [ 3139.674525] ? lock_downgrade+0x900/0x900 [ 3139.678735] ? getname+0x19/0x20 [ 3139.682445] ? kasan_check_read+0x11/0x20 [ 3139.686624] ? do_raw_spin_unlock+0xa7/0x330 [ 3139.691039] ? do_raw_spin_trylock+0x270/0x270 [ 3139.695981] ? __lock_is_held+0xb5/0x140 [ 3139.700063] ? __check_object_size+0xb1/0x782 [ 3139.705866] ? _raw_spin_unlock+0x2c/0x50 [ 3139.710057] ? __alloc_fd+0x347/0x6e0 [ 3139.714250] do_filp_open+0x255/0x380 [ 3139.718071] ? may_open_dev+0x100/0x100 [ 3139.722094] ? get_unused_fd_flags+0x122/0x1a0 [ 3139.727057] ? __alloc_fd+0x6e0/0x6e0 [ 3139.730899] do_sys_open+0x568/0x780 [ 3139.734976] ? filp_open+0x80/0x80 [ 3139.738540] ? trace_hardirqs_off_caller+0x310/0x310 [ 3139.743997] __x64_sys_open+0x7e/0xc0 [ 3139.747818] do_syscall_64+0x1b9/0x820 [ 3139.751726] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 3139.757542] ? syscall_return_slowpath+0x5e0/0x5e0 [ 3139.762821] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3139.767699] ? trace_hardirqs_on_caller+0x310/0x310 [ 3139.773108] ? prepare_exit_to_usermode+0x291/0x3b0 [ 3139.778148] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3139.783329] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3139.788595] RIP: 0033:0x455570 [ 3139.791918] Code: Bad RIP value. [ 3139.795620] RSP: 002b:00007ffd002fd4f0 EFLAGS: 00000206 ORIG_RAX: 0000000000000002 [ 3139.803653] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000455570 [ 3139.810951] RDX: 0000000000000000 RSI: 0000000000090800 RDI: 00000000004bc2ae [ 3139.818633] RBP: 0000000000003a9d R08: 0000000000000001 R09: 000000000145b940 [ 3139.826326] R10: 0000000000000000 R11: 0000000000000206 R12: 000000000000000a [ 3139.834861] R13: 00000000002d8d1a R14: 000000000000164e R15: 0000000000000000 [ 3139.842560] INFO: task syz-executor0:16011 blocked for more than 140 seconds. [ 3139.849847] Not tainted 4.20.0-rc5-next-20181207+ #163 [ 3139.855950] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3139.864201] syz-executor0 D24832 16011 6078 0x00000004 [ 3139.869864] Call Trace: [ 3139.872856] __schedule+0xa41/0x21e0 [ 3139.876594] ? __sched_text_start+0x8/0x8 [ 3139.880755] ? graph_lock+0x270/0x270 [ 3139.884929] ? __lock_acquire+0x62f/0x4c20 [ 3139.889182] ? graph_lock+0x270/0x270 [ 3139.893340] ? graph_lock+0x270/0x270 [ 3139.897168] ? find_held_lock+0x36/0x1c0 [ 3139.901250] ? __mutex_lock+0xafa/0x16f0 [ 3139.905653] schedule+0xef/0x370 [ 3139.909072] ? __schedule+0x21e0/0x21e0 [ 3139.913476] ? kasan_check_read+0x11/0x20 [ 3139.917640] ? do_raw_spin_unlock+0xa7/0x330 [ 3139.922075] ? do_raw_spin_trylock+0x270/0x270 [ 3139.927157] ? ww_mutex_lock.part.8+0xf0/0xf0 [ 3139.931694] ? mutex_destroy+0x200/0x200 [ 3139.936195] schedule_preempt_disabled+0x13/0x20 [ 3139.940967] __mutex_lock+0xaff/0x16f0 [ 3139.945171] ? genl_rcv_msg+0x13a/0x168 [ 3139.949161] ? mark_held_locks+0xe0/0x130 [ 3139.953614] ? mutex_lock_io_nested+0x1570/0x1570 [ 3139.958495] ? __netlink_lookup+0x5ec/0xb00 [ 3139.964126] ? lock_downgrade+0x900/0x900 [ 3139.968304] ? check_preemption_disabled+0x48/0x280 [ 3139.973741] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3139.979296] ? __radix_tree_lookup+0x3b6/0x510 [ 3139.984275] ? radix_tree_insert+0x870/0x870 [ 3139.988710] ? lock_downgrade+0x900/0x900 [ 3139.993187] ? check_preemption_disabled+0x48/0x280 [ 3139.998224] ? kasan_check_read+0x11/0x20 [ 3140.002883] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 3140.008177] ? rcu_read_unlock_special+0x370/0x370 [ 3140.013487] ? lock_acquire+0x1ed/0x520 [ 3140.017486] mutex_lock_nested+0x16/0x20 [ 3140.021549] ? mutex_lock_nested+0x16/0x20 [ 3140.026189] genl_rcv_msg+0x13a/0x168 [ 3140.030038] netlink_rcv_skb+0x172/0x440 [ 3140.034444] ? genl_family_rcv_msg+0x11a0/0x11a0 [ 3140.039218] ? netlink_ack+0xb80/0xb80 [ 3140.043997] ? down_read+0x8d/0x120 [ 3140.047651] genl_rcv+0x28/0x40 [ 3140.050964] netlink_unicast+0x5a5/0x760 [ 3140.055433] ? netlink_attachskb+0x9a0/0x9a0 [ 3140.059878] ? aa_sk_perm+0x22b/0x8e0 [ 3140.064041] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 3140.069081] netlink_sendmsg+0xa18/0xfc0 [ 3140.073467] ? netlink_unicast+0x760/0x760 [ 3140.077750] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 3140.083045] ? apparmor_socket_sendmsg+0x29/0x30 [ 3140.087818] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3140.094666] ? security_socket_sendmsg+0x94/0xc0 [ 3140.099454] ? netlink_unicast+0x760/0x760 [ 3140.104047] sock_sendmsg+0xd5/0x120 [ 3140.107783] ___sys_sendmsg+0x7fd/0x930 [ 3140.111782] ? kasan_check_read+0x11/0x20 [ 3140.116277] ? copy_msghdr_from_user+0x580/0x580 [ 3140.121071] ? __fget_light+0x2e9/0x430 [ 3140.125431] ? fget_raw+0x20/0x20 [ 3140.128903] ? __might_fault+0x12b/0x1e0 [ 3140.133374] ? lock_downgrade+0x900/0x900 [ 3140.137570] ? lock_release+0xa00/0xa00 [ 3140.141547] ? perf_trace_sched_process_exec+0x860/0x860 [ 3140.147387] ? posix_ktime_get_ts+0x15/0x20 [ 3140.151722] ? trace_hardirqs_off_caller+0x310/0x310 [ 3140.157291] ? __do_page_fault+0x402/0xd70 [ 3140.161560] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3140.167426] ? sockfd_lookup_light+0xc5/0x160 [ 3140.171939] __sys_sendmsg+0x11d/0x280 [ 3140.176138] ? __ia32_sys_shutdown+0x80/0x80 [ 3140.180558] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3140.186439] ? put_timespec64+0x10f/0x1b0 [ 3140.190604] ? do_syscall_64+0x9a/0x820 [ 3140.194937] ? do_syscall_64+0x9a/0x820 [ 3140.198936] ? trace_hardirqs_off_caller+0x310/0x310 [ 3140.204377] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3140.209947] __x64_sys_sendmsg+0x78/0xb0 [ 3140.214323] do_syscall_64+0x1b9/0x820 [ 3140.218270] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 3140.224928] ? syscall_return_slowpath+0x5e0/0x5e0 [ 3140.229868] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3140.235097] ? trace_hardirqs_on_caller+0x310/0x310 [ 3140.240146] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 3140.246417] ? prepare_exit_to_usermode+0x291/0x3b0 [ 3140.251501] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3140.256632] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3140.261859] RIP: 0033:0x457569 [ 3140.265399] Code: Bad RIP value. [ 3140.268770] RSP: 002b:00007f3e4e757c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3140.277816] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 3140.285385] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000005 [ 3140.293919] RBP: 000000000072c040 R08: 0000000000000000 R09: 0000000000000000 [ 3140.301199] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3e4e7586d4 [ 3140.308824] R13: 00000000004c3fd7 R14: 00000000004d6668 R15: 00000000ffffffff [ 3140.316542] [ 3140.316542] Showing all locks held in the system: [ 3140.324185] 1 lock held by khungtaskd/1025: [ 3140.328528] #0: 00000000b5f2506a (rcu_read_lock){....}, at: debug_show_all_locks+0xd0/0x424 [ 3140.337855] 1 lock held by rsyslogd/5947: [ 3140.342013] #0: 0000000056e17d15 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1bb/0x200 [ 3140.350346] 2 locks held by getty/6037: [ 3140.354746] #0: 0000000032a7b335 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 3140.364281] #1: 00000000f341b54c (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ee0 [ 3140.373589] 2 locks held by getty/6038: [ 3140.377602] #0: 000000002a088cbd (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 3140.387148] #1: 00000000b82df8c2 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ee0 [ 3140.396517] 2 locks held by getty/6039: [ 3140.400495] #0: 00000000773f76df (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 3140.409188] #1: 00000000d3079687 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ee0 [ 3140.419328] 2 locks held by getty/6040: [ 3140.423631] #0: 00000000e662fe02 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 3140.431935] #1: 000000004a8f8e82 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ee0 [ 3140.441172] 2 locks held by getty/6041: [ 3140.445461] #0: 00000000450c84d7 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 3140.454989] #1: 000000005121de95 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ee0 [ 3140.464171] 2 locks held by getty/6042: [ 3140.468149] #0: 00000000237b708d (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 3140.476804] #1: 00000000c7ec1f78 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ee0 [ 3140.485999] 2 locks held by getty/6043: [ 3140.489981] #0: 000000000de701cf (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 3140.498790] #1: 00000000764e54c3 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ee0 [ 3140.508964] 2 locks held by syz-executor0/6078: [ 3140.514005] #0: 00000000caceef94 (&sb->s_type->i_mutex_key#24){++++}, at: lookup_slow+0x49/0x80 [ 3140.523270] #1: 000000003aa040cd (&sbi->s_lock){+.+.}, at: vfat_lookup+0xf1/0x640 [ 3140.531020] 1 lock held by syz-executor0/8744: [ 3140.536313] #0: 0000000039fc3f49 (&sig->cred_guard_mutex){+.+.}, at: prepare_bprm_creds+0x53/0x120 [ 3140.545896] 5 locks held by syz-executor0/15955: [ 3140.550663] 2 locks held by syz-executor0/16011: [ 3140.555870] #0: 00000000944f054c (cb_lock){++++}, at: genl_rcv+0x19/0x40 [ 3140.564177] #1: 000000006bf9e60f (genl_mutex){+.+.}, at: genl_rcv_msg+0x13a/0x168 [ 3140.571977] [ 3140.573978] ============================================= [ 3140.573978] [ 3140.581005] NMI backtrace for cpu 0 [ 3140.584771] CPU: 0 PID: 1025 Comm: khungtaskd Not tainted 4.20.0-rc5-next-20181207+ #163 [ 3140.593002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3140.602381] Call Trace: [ 3140.604975] dump_stack+0x244/0x39d [ 3140.608629] ? dump_stack_print_info.cold.1+0x20/0x20 [ 3140.613830] ? check_preemption_disabled+0x48/0x280 [ 3140.618854] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3140.624432] nmi_cpu_backtrace.cold.2+0x5c/0xa1 [ 3140.629182] ? lapic_can_unplug_cpu.cold.27+0x3f/0x3f [ 3140.634383] nmi_trigger_cpumask_backtrace+0x1e8/0x22a [ 3140.639672] arch_trigger_cpumask_backtrace+0x14/0x20 [ 3140.644886] watchdog+0xb51/0x1060 [ 3140.648448] ? hungtask_pm_notify+0xb0/0xb0 [ 3140.652783] ? __kthread_parkme+0xce/0x1a0 [ 3140.657027] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 3140.662149] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 3140.667264] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 3140.671870] ? trace_hardirqs_on+0xbd/0x310 [ 3140.676196] ? kasan_check_read+0x11/0x20 [ 3140.680354] ? __kthread_parkme+0xce/0x1a0 [ 3140.684594] ? trace_hardirqs_off_caller+0x310/0x310 [ 3140.689713] ? __schedule+0x21e0/0x21e0 [ 3140.693704] ? lockdep_init_map+0x9/0x10 [ 3140.697781] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 3140.702892] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3140.708438] ? __kthread_parkme+0xfb/0x1a0 [ 3140.712699] ? hungtask_pm_notify+0xb0/0xb0 [ 3140.717052] kthread+0x35a/0x440 [ 3140.720447] ? kthread_stop+0x900/0x900 [ 3140.724470] ret_from_fork+0x3a/0x50 [ 3140.728310] Sending NMI from CPU 0 to CPUs 1: [ 3140.735832] INFO: NMI handler (nmi_cpu_backtrace_handler) took too long to run: 2.667 msecs [ 3140.735856] NMI backtrace for cpu 1 [ 3140.735863] CPU: 1 PID: 15955 Comm: syz-executor0 Not tainted 4.20.0-rc5-next-20181207+ #163 [ 3140.735869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3140.735874] RIP: 0010:__sanitizer_cov_trace_pc+0x8/0x50 [ 3140.735887] Code: d0 72 1b 49 83 c1 01 4a 89 7c 10 e0 4a 89 74 10 e8 4a 89 54 10 f0 4a 89 4c d8 20 4c 89 08 5d c3 66 90 55 48 89 e5 48 8b 75 08 <65> 48 8b 04 25 40 ee 01 00 65 8b 15 08 f6 81 7e 81 e2 00 01 1f 00 [ 3140.735891] RSP: 0018:ffff8881d4a1daf0 EFLAGS: 00000046 [ 3140.735900] RAX: 0000000000000002 RBX: 0000000000000000 RCX: ffffffff8393e39d [ 3140.735906] RDX: 0000000000000000 RSI: ffffffff8393e338 RDI: 0000000000000007 [ 3140.735912] RBP: ffff8881d4a1daf0 R08: ffff8881d7a54240 R09: fffff94000be15b6 [ 3140.735918] R10: fffff94000be15b6 R11: ffffea0005f0adb7 R12: 0000000000000001 [ 3140.735924] R13: ffffffff8880e440 R14: ffffffff8855e540 R15: 0000000000000427 [ 3140.735931] FS: 00007f3e4e79a700(0000) GS:ffff8881dad00000(0000) knlGS:0000000000000000 [ 3140.735936] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3140.735942] CR2: ffffffffff600400 CR3: 00000001c8452000 CR4: 00000000001406e0 [ 3140.735948] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 3140.735954] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 3140.735957] Call Trace: [ 3140.735962] check_preemption_disabled+0x48/0x280 [ 3140.735966] __this_cpu_preempt_check+0x1c/0x20 [ 3140.735970] __find_get_block+0x183/0xf20 [ 3140.735974] ? try_to_free_buffers+0xd40/0xd40 [ 3140.735979] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3140.735983] ? unlock_page+0x2c2/0x4c0 [ 3140.735987] ? wake_up_page_bit+0x6f0/0x6f0 [ 3140.735991] ? init_page_buffers+0x2b5/0x570 [ 3140.735996] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3140.736000] ? init_page_buffers+0x433/0x570 [ 3140.736005] ? __set_page_dirty_buffers+0x810/0x810 [ 3140.736008] ? __getblk_gfp+0xb28/0x1030 [ 3140.736022] __getblk_gfp+0x3d3/0x1030 [ 3140.736026] ? __find_get_block+0xf20/0xf20 [ 3140.736030] ? request_firmware+0x37/0x50 [ 3140.736034] ? nl80211_reload_regdb+0xe/0x10 [ 3140.736039] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 3140.736043] ? retint_kernel+0x2d/0x2d [ 3140.736047] ? trace_hardirqs_on_caller+0xc0/0x310 [ 3140.736052] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3140.736056] ? graph_lock+0x270/0x270 [ 3140.736060] ? trace_hardirqs_on_caller+0xc0/0x310 [ 3140.736064] __bread_gfp+0x2d/0x310 [ 3140.736068] fat__get_entry+0x5a6/0xa40 [ 3140.736073] ? perf_trace_sched_process_exec+0x860/0x860 [ 3140.736077] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3140.736082] ? __d_lookup_rcu+0x556/0xaa0 [ 3140.736086] ? copy_overflow+0x30/0x30 [ 3140.736090] ? __mutex_lock+0x85e/0x16f0 [ 3140.736093] ? vfat_lookup+0xf1/0x640 [ 3140.736098] ? d_alloc_parallel+0x8e8/0x1f40 [ 3140.736102] fat_search_long+0x33b/0x1570 [ 3140.736106] ? kasan_check_read+0x11/0x20 [ 3140.736110] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 3140.736115] ? rcu_read_unlock_special+0x370/0x370 [ 3140.736119] ? fat_parse_short+0x2cc0/0x2cc0 [ 3140.736123] ? __d_lookup_rcu+0xaa0/0xaa0 [ 3140.736128] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 3140.736133] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3140.736136] ? retint_kernel+0x2d/0x2d [ 3140.736140] vfat_find+0x16d/0x1a0 [ 3140.736144] vfat_lookup+0x107/0x640 [ 3140.736148] ? __lockdep_init_map+0x105/0x590 [ 3140.736152] ? vfat_find_form+0x120/0x120 [ 3140.736156] ? lockdep_init_map+0x9/0x10 [ 3140.736170] ? __init_waitqueue_head+0x9e/0x150 [ 3140.736174] ? init_wait_entry+0x1c0/0x1c0 [ 3140.736178] ? lock_acquire+0x268/0x520 [ 3140.736182] __lookup_slow+0x2b5/0x540 [ 3140.736186] ? vfs_unlink+0x510/0x510 [ 3140.736189] ? path_init+0x1ed0/0x1ed0 [ 3140.736193] lookup_slow+0x57/0x80 [ 3140.736197] walk_component+0x92b/0x2590 [ 3140.736201] ? mark_held_locks+0xc7/0x130 [ 3140.736205] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3140.736209] ? pick_link+0xaf0/0xaf0 [ 3140.736213] ? set_root+0x4a9/0x810 [ 3140.736217] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3140.736222] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 3140.736226] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3140.736230] ? retint_kernel+0x2d/0x2d [ 3140.736235] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3140.736239] ? vfat_hashi+0x14d/0x390 [ 3140.736243] link_path_walk.part.40+0xa61/0x1530 [ 3140.736247] ? lookup_open+0x1b90/0x1b90 [ 3140.736251] ? walk_component+0x2590/0x2590 [ 3140.736256] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3140.736260] ? check_preemption_disabled+0x48/0x280 [ 3140.736265] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3140.736270] ? percpu_counter_add_batch+0x141/0x190 [ 3140.736274] path_openat+0x270/0x5150 [ 3140.736278] ? is_bpf_text_address+0xac/0x170 [ 3140.736282] ? find_held_lock+0x36/0x1c0 [ 3140.736286] ? path_lookupat.isra.43+0xc00/0xc00 [ 3140.736290] ? mark_held_locks+0xc7/0x130 [ 3140.736295] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 3140.736315] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 3140.736319] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 3140.736323] ? trace_hardirqs_on+0xbd/0x310 [ 3140.736328] ? kasan_check_read+0x11/0x20 [ 3140.736332] ? depot_save_stack+0x292/0x470 [ 3140.736336] ? trace_hardirqs_off_caller+0x310/0x310 [ 3140.736341] ? unwind_get_return_address+0x61/0xa0 [ 3140.736346] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 3140.736350] ? depot_save_stack+0x292/0x470 [ 3140.736354] ? save_stack+0xa9/0xd0 [ 3140.736358] ? save_stack+0x43/0xd0 [ 3140.736362] ? kasan_kmalloc+0xcb/0xd0 [ 3140.736366] ? kasan_slab_alloc+0x12/0x20 [ 3140.736371] ? kmem_cache_alloc+0x130/0x730 [ 3140.736375] ? getname_kernel+0x54/0x370 [ 3140.736379] ? filp_open+0x1f/0x80 [ 3140.736383] ? kernel_read_file_from_path+0x7f/0x100 [ 3140.736388] ? _request_firmware+0xaea/0x15b0 [ 3140.736392] ? request_firmware+0x37/0x50 [ 3140.736396] ? reg_reload_regdb+0x84/0x2f0 [ 3140.736401] ? nl80211_reload_regdb+0xe/0x10 [ 3140.736405] ? genl_family_rcv_msg+0x8a7/0x11a0 [ 3140.736409] ? genl_rcv_msg+0xc6/0x168 [ 3140.736413] ? netlink_rcv_skb+0x172/0x440 [ 3140.736417] ? genl_rcv+0x28/0x40 [ 3140.736421] ? netlink_unicast+0x5a5/0x760 [ 3140.736426] ? netlink_sendmsg+0xa18/0xfc0 [ 3140.736430] ? sock_sendmsg+0xd5/0x120 [ 3140.736434] ? ___sys_sendmsg+0x7fd/0x930 [ 3140.736438] ? __sys_sendmsg+0x11d/0x280 [ 3140.736442] ? __x64_sys_sendmsg+0x78/0xb0 [ 3140.736446] ? do_syscall_64+0x1b9/0x820 [ 3140.736451] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3140.736455] do_filp_open+0x255/0x380 [ 3140.736459] ? may_open_dev+0x100/0x100 [ 3140.736463] ? getname_kernel+0x54/0x370 [ 3140.736468] ? __lock_is_held+0xb5/0x140 [ 3140.736472] ? getname_kernel+0x54/0x370 [ 3140.736476] file_open_name+0x382/0x560 [ 3140.736480] ? vfs_open+0xd0/0xd0 [ 3140.736483] filp_open+0x5d/0x80 [ 3140.736488] kernel_read_file_from_path+0x7f/0x100 [ 3140.736492] _request_firmware+0xaea/0x15b0 [ 3140.736496] ? assign_fw+0x6b0/0x6b0 [ 3140.736501] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 3140.736505] ? retint_kernel+0x2d/0x2d [ 3140.736509] ? trace_hardirqs_on_caller+0xc0/0x310 [ 3140.736529] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3140.736534] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 3140.736538] ? refcount_dec_if_one+0x180/0x180 [ 3140.736543] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3140.736548] ? trace_event_raw_event_module_request+0x340/0x340 [ 3140.736552] ? __nla_parse+0x41/0x3e0 [ 3140.736556] request_firmware+0x37/0x50 [ 3140.736560] reg_reload_regdb+0x84/0x2f0 [ 3140.736565] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3140.736569] ? is_world_regdom+0xf0/0xf0 [ 3140.736574] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3140.736578] ? nl80211_pre_doit+0xa7/0x640 [ 3140.736582] nl80211_reload_regdb+0xe/0x10 [ 3140.736586] genl_family_rcv_msg+0x8a7/0x11a0 [ 3140.736590] ? genl_unregister_family+0x8a0/0x8a0 [ 3140.736594] ? lock_downgrade+0x900/0x900 [ 3140.736599] ? check_preemption_disabled+0x48/0x280 [ 3140.736603] ? kasan_check_read+0x11/0x20 [ 3140.736608] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 3140.736612] ? rcu_read_unlock_special+0x370/0x370 [ 3140.736616] genl_rcv_msg+0xc6/0x168 [ 3140.736620] netlink_rcv_skb+0x172/0x440 [ 3140.736624] ? genl_family_rcv_msg+0x11a0/0x11a0 [ 3140.736628] ? netlink_ack+0xb80/0xb80 [ 3140.736632] ? down_read+0x8d/0x120 [ 3140.736635] genl_rcv+0x28/0x40 [ 3140.736639] netlink_unicast+0x5a5/0x760 [ 3140.736644] ? netlink_attachskb+0x9a0/0x9a0 [ 3140.736649] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3140.736653] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 3140.736657] netlink_sendmsg+0xa18/0xfc0 [ 3140.736661] ? netlink_unicast+0x760/0x760 [ 3140.736666] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 3140.736670] ? apparmor_socket_sendmsg+0x29/0x30 [ 3140.736675] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3140.736692] ? security_socket_sendmsg+0x94/0xc0 [ 3140.736696] ? netlink_unicast+0x760/0x760 [ 3140.736700] sock_sendmsg+0xd5/0x120 [ 3140.736704] ___sys_sendmsg+0x7fd/0x930 [ 3140.736708] ? find_held_lock+0x36/0x1c0 [ 3140.736713] ? copy_msghdr_from_user+0x580/0x580 [ 3140.736717] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3140.736721] ? __fget_light+0x2e9/0x430 [ 3140.736725] ? fget_raw+0x20/0x20 [ 3140.736729] ? __might_fault+0x12b/0x1e0 [ 3140.736733] ? lock_downgrade+0x900/0x900 [ 3140.736737] ? lock_release+0xa00/0xa00 [ 3140.736741] ? perf_trace_sched_process_exec+0x860/0x860 [ 3140.736746] ? posix_ktime_get_ts+0x15/0x20 [ 3140.736750] ? trace_hardirqs_off_caller+0x310/0x310 [ 3140.736755] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3140.736759] ? sockfd_lookup_light+0xc5/0x160 [ 3140.736763] __sys_sendmsg+0x11d/0x280 [ 3140.736767] ? __ia32_sys_shutdown+0x80/0x80 [ 3140.736772] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3140.736777] ? put_timespec64+0x10f/0x1b0 [ 3140.736781] ? do_syscall_64+0x9a/0x820 [ 3140.736785] ? do_syscall_64+0x9a/0x820 [ 3140.736789] ? trace_hardirqs_off_caller+0x310/0x310 [ 3140.736793] __x64_sys_sendmsg+0x78/0xb0 [ 3140.736797] do_syscall_64+0x1b9/0x820 [ 3140.736802] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 3140.736806] ? syscall_return_slowpath+0x5e0/0x5e0 [ 3140.736811] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3140.736830] ? trace_hardirqs_on_caller+0x310/0x310 [ 3140.736835] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 3140.736839] ? prepare_exit_to_usermode+0x291/0x3b0 [ 3140.736844] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3140.736848] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3140.736851] RIP: 0033:0x457569 [ 3140.736878] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3140.736883] Lost 7 message(s)! [ 3140.749218] Kernel panic - not syncing: hung_task: blocked tasks [ 3141.750034] CPU: 0 PID: 1025 Comm: khungtaskd Not tainted 4.20.0-rc5-next-20181207+ #163 [ 3141.758256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3141.767606] Call Trace: [ 3141.770206] dump_stack+0x244/0x39d [ 3141.773854] ? dump_stack_print_info.cold.1+0x20/0x20 [ 3141.779059] panic+0x2ad/0x632 [ 3141.782257] ? add_taint.cold.5+0x16/0x16 [ 3141.786410] ? nmi_trigger_cpumask_backtrace+0x1c8/0x22a [ 3141.791877] ? nmi_trigger_cpumask_backtrace+0x1f9/0x22a [ 3141.797331] ? nmi_trigger_cpumask_backtrace+0x1d1/0x22a [ 3141.802786] ? nmi_trigger_cpumask_backtrace+0x1c8/0x22a [ 3141.808264] watchdog+0xb62/0x1060 [ 3141.811824] ? hungtask_pm_notify+0xb0/0xb0 [ 3141.816159] ? __kthread_parkme+0xce/0x1a0 [ 3141.820415] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 3141.825527] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 3141.830657] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 3141.835261] ? trace_hardirqs_on+0xbd/0x310 [ 3141.839589] ? kasan_check_read+0x11/0x20 [ 3141.842166] syz-executor0(15955): getblk(): executed=9 bh_count=0 bh_state=0 [ 3141.843763] ? __kthread_parkme+0xce/0x1a0 [ 3141.855165] ? trace_hardirqs_off_caller+0x310/0x310 [ 3141.860274] ? __schedule+0x21e0/0x21e0 [ 3141.864265] ? lockdep_init_map+0x9/0x10 [ 3141.868334] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 3141.873457] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3141.879010] ? __kthread_parkme+0xfb/0x1a0 [ 3141.883288] ? hungtask_pm_notify+0xb0/0xb0 [ 3141.887612] kthread+0x35a/0x440 [ 3141.890987] ? kthread_stop+0x900/0x900 [ 3141.894969] ret_from_fork+0x3a/0x50 [ 3141.899762] Kernel Offset: disabled [ 3141.903390] Rebooting in 86400 seconds..