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", 0x1000, 0x4}], 0x10, &(0x7f0000002680)='+wlan0security,em0wlan1selinux-\x00') setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000002900)={0x2, 0x4e21, @rand_addr=0x1ff}, 0x10) getsockopt$inet_dccp_buf(r0, 0x21, 0xcd, &(0x7f0000002800)=""/183, &(0x7f00000028c0)=0xb7) [ 796.887604] 00000000ddd27bd4: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 797.001616] 00000000fbe3570d: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 797.026349] XFS (loop1): unknown mount option [/selinux/mls]. [ 797.101245] 0000000077ba04dc: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 797.140234] 00000000f8fa8906: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 797.149477] 00000000bbff3d18: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 797.165020] 000000007fc29b0f: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 797.168641] XFS (loop1): unknown mount option [/selinux/mls]. [ 797.177573] XFS (loop5): SB validate failed with error -117. 12:11:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 12:11:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="584653420fff1000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 797.264326] XFS (loop4): SB sanity check failed [ 797.269061] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 12:11:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x70020000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) 12:11:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x2, 0x2, 0xabe, 0x8e5, 0x7, r1}) [ 797.355977] XFS (loop4): Unmount and run xfs_repair [ 797.390211] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 797.396924] 00000000d9518351: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 797.531063] 00000000d92333d7: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 797.594713] XFS (loop5): SB sanity check failed [ 797.599786] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 797.613853] 0000000092037735: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 797.631980] XFS (loop1): Invalid superblock magic number [ 797.667553] 0000000046c985f5: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 797.709667] 00000000216d95c8: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 12:11:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) [ 797.750413] XFS (loop5): Unmount and run xfs_repair [ 797.760891] 00000000a55c9591: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ 12:11:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x5a00, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 797.803897] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 797.818679] 000000002a8b6bfc: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 797.865595] 00000000a1dbd9e5: 58 46 53 42 0f ff 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 797.870360] 000000006d86eaf7: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 797.951070] XFS (loop4): SB validate failed with error -117. [ 797.993687] 000000004f93579a: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 12:11:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 798.050178] XFS (loop1): Invalid superblock magic number 12:11:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) [ 798.112040] 00000000552e2e0d: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 12:11:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) [ 798.205637] 00000000a15fadeb: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 798.257518] 000000009d8ede87: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 12:11:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2200000000000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 798.316211] 00000000482d5b0b: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 798.389869] 00000000bdf0d4f1: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 798.434808] 0000000065cef64d: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 798.464796] XFS (loop1): Invalid superblock magic number [ 798.479379] XFS (loop5): SB validate failed with error -117. 12:11:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534203fa1000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 798.595050] XFS (loop4): Mounting V4 Filesystem [ 798.620072] attempt to access beyond end of device [ 798.627937] loop4: rw=4096, want=2036888240641, limit=264192 12:11:12 executing program 1: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={0x0, 0xecf8, 0x100, 0x1f}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000140)={r1, 0x26}, &(0x7f0000000180)=0x8) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/144, 0x90) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) [ 798.687085] XFS (loop4): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 798.710289] XFS (loop4): empty log check failed [ 798.717849] XFS (loop4): log mount/recovery failed: error -5 [ 798.733620] XFS (loop4): log mount failed 12:11:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x6300, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 798.767134] XFS (loop1): unknown mount option [/dev/null]. [ 798.842429] XFS (loop5): unknown mount option [/dev/loop0]. 12:11:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 12:11:12 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x101000, 0x0) write$P9_ROPEN(r0, &(0x7f0000000080)={0x18, 0x71, 0x2, {{0x80, 0x3, 0x4}, 0x9}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) 12:11:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000200000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:11:13 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r4, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) flistxattr(r2, &(0x7f0000001200)=""/158, 0x9e) pipe(&(0x7f0000000040)) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0xfffffffffffffffa, 0x400, 0x2, 0x7}) openat$full(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/full\x00', 0x202000, 0x0) unshare(0x40000000) dup2(0xffffffffffffffff, 0xffffffffffffffff) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 799.080655] XFS (loop1): unknown mount option [/dev/rtc0]. 12:11:13 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000180)='xfs\x00', 0x4) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x2000, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000140), &(0x7f00000001c0)=0x8) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/mls\x00', 0x0, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000280)=0x0) ioctl$BLKBSZSET(r2, 0x40081271, &(0x7f0000000000)=0xb4) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0xe3, 0xa10, 0x100000000, 0x6, 0x0, 0x100, 0x4000, 0x8, 0xfffffffffffffff7, 0x9, 0x20, 0x0, 0x1f, 0x8001, 0x2, 0x0, 0x2, 0x800000000000000, 0x6a, 0x100000001, 0x9, 0x400, 0x53d, 0x0, 0x5, 0x4, 0x4, 0x9b, 0x9, 0x7fffffff, 0x81, 0x5, 0x2, 0xdd97, 0x80000001, 0xdf, 0x0, 0x69, 0xa52863c2340157a5, @perf_config_ext={0x2, 0x57}, 0x10010, 0x8, 0x6, 0x3, 0xe583, 0x1, 0xff}, r4, 0xe, r0, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000000)=ANY=[]) 12:11:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 799.515543] XFS (loop5): SB sanity check failed [ 799.520447] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 799.539043] IPVS: ftp: loaded support on port[0] = 21 [ 799.554516] XFS (loop1): unknown mount option [´]. [ 799.563740] XFS (loop5): Unmount and run xfs_repair [ 799.578155] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 799.589350] XFS (loop2): Invalid superblock magic number [ 799.609350] 00000000908ff6bb: 58 46 53 42 00 00 02 00 00 00 00 00 00 00 10 00 XFSB............ 12:11:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x7700, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 799.657082] 00000000c4e2674a: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 799.680675] XFS (loop1): unknown mount option [´]. [ 799.694049] 000000007df86630: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 12:11:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netdev_private(r0, 0x89ff, &(0x7f0000000140)="73db1e0dc38db46ed1fd02f0f64388435d9d66c3301565ca6dc916b05aecace60bc6fa23affc0c17274697e3394e457b56fe6e27a1e9b42b8fe576711bfea8a9ddb40d92b9ff47a884c8598256b5fde72ac3a4f7c905e321dea9b8823c4ee05cc9f868e3349e34455a7d59c35787ac83788340a0c6ec5b1879085a6d425bbc01bba2076cbfa45243b8092c1ad9f9e06fbfc3ed8a616e2d3d675103412e142e782b1c558e10f1b05a7ee203815f8981d4e5bc") [ 799.750732] 00000000e91ad11b: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 799.790397] 000000001b32a1fb: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 799.866327] 00000000b39477fc: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 799.925670] XFS (loop1): unknown mount option []. [ 799.946435] 00000000770394d7: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... 12:11:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1227dac5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) [ 800.048791] 00000000b0e79556: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 12:11:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) [ 800.140400] XFS (loop5): SB validate failed with error -117. 12:11:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:11:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000004000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 800.367543] XFS (loop1): Invalid superblock magic number [ 800.412362] XFS (loop5): unknown mount option [/dev/loop0]. 12:11:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x100, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f00000000c0)={0x87, 0x3, 0xfff, 0x4, 0x9, 0x20}) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240), &(0x7f0000000300)=[&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)=',\x00']) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x8000, 0x0) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000380)={0x5, 0x2, 0x103}) syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x40000) 12:11:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8cffffff00000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) 12:11:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff]}) [ 800.552680] XFS (loop4): Mounting V4 Filesystem [ 800.601768] attempt to access beyond end of device 12:11:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x8100, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 800.649641] XFS (loop1): unknown mount option [./file0]. 12:11:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534260011000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 800.711418] loop4: rw=4096, want=2036888240641, limit=264192 12:11:14 executing program 1: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x7, 0x220800) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000280)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000340)) r2 = getgid() getgroups(0x2, &(0x7f0000000440)=[0x0, r2]) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000480)=0xe2a, 0x12) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000580)={0x6, 0x48d, 0x0, 0x29a, 0x8}) r7 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r5, 0x894b, &(0x7f0000000540)) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r6, 0x40045532, &(0x7f00000004c0)=0xa2dd) r8 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r8, r7, &(0x7f0000209000/0x18000)=nil, &(0x7f0000000100)=[@text16={0x10, &(0x7f0000000400)="66b8010000000f01c1baf80d66b8f8a2e28366efbafc0c66b8dd52aa7966ef6436f2a40f30dbd07c800f2169650f019d64d90f214d0f01df", 0x38}], 0xaaaaba9, 0x1, &(0x7f0000000140), 0x0) r9 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r9, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x112) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.nlink\x00') clock_gettime(0x0, &(0x7f00000005c0)={0x0, 0x0}) ioctl$KDSKBMODE(r5, 0x4b45, &(0x7f0000000740)=0x9) write$sndseq(r8, &(0x7f0000000600)=[{0x4, 0x4, 0x39f1, 0x0, @time, {0x2a}, {0x0, 0x1}, @queue={0x8, {0xffff, 0x8}}}, {0x401, 0x0, 0x400, 0x3ff, @time={r10, r11+10000000}, {0x2}, {0xffffffff, 0x3}, @queue={0xffffffffffffff03}}, {0x5, 0x4f4, 0x0, 0x9, @time={0x77359400}, {0xa000000000000, 0x8a}, {0xfffffffffffeffff, 0x3}, @connect={{0x75}, {0x6}}}], 0x90) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000dc0)={{{@in=@dev, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000000ec0)=0xe8) sendmsg$xdp(r12, &(0x7f00000011c0)={&(0x7f0000000f00)={0x2c, 0x0, r13, 0x38}, 0x10, &(0x7f0000001180)=[{&(0x7f0000001100)="6055898864daadd4dfb0e3927da17109ebe94448915a20e54901370be1", 0x1d}], 0x1, 0x0, 0x0, 0x20000000}, 0x8000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) [ 800.758528] XFS (loop4): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 800.857634] XFS (loop4): empty log check failed [ 800.915770] XFS (loop4): log mount/recovery failed: error -5 [ 801.025596] XFS (loop4): log mount failed [ 801.176240] XFS (loop5): SB sanity check failed [ 801.182616] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 12:11:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 801.290871] XFS (loop5): Unmount and run xfs_repair [ 801.296503] XFS (loop0): Invalid superblock magic number [ 801.339290] XFS (loop5): First 128 bytes of corrupted metadata buffer: 12:11:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000]}) 12:11:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x20000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 801.442488] 00000000bedd8bf8: 58 46 53 42 60 01 10 00 00 00 00 00 00 00 10 00 XFSB`........... [ 801.549312] 0000000014454d7e: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 801.558796] 0000000050978787: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 801.582013] 0000000056fb6e18: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ 12:11:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0xffff8801c55f52d8, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 801.655939] XFS (loop4): Mounting V4 Filesystem [ 801.677281] 000000002ec63394: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 801.735075] attempt to access beyond end of device [ 801.764883] loop4: rw=4096, want=2036888240641, limit=264192 [ 801.777562] 00000000ff28311e: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 801.856538] XFS (loop4): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 801.867562] XFS (loop1): unknown mount option [/dev/sequencer2]. [ 801.901527] 000000003b87338f: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 801.949246] 000000009fe44a13: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 801.965423] XFS (loop4): empty log check failed [ 802.014734] XFS (loop4): log mount/recovery failed: error -5 12:11:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff00000000]}) [ 802.069220] XFS (loop4): log mount failed [ 802.076586] XFS (loop5): SB validate failed with error -117. 12:11:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534209001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:11:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe5, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x2001, 0x0) sendmsg$nl_route(r0, &(0x7f00000024c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000023c0)={&(0x7f0000002440)=@ipv4_newrule={0x44, 0x20, 0x400, 0x70bd2a, 0x25dfdbfb, {0x2, 0x10, 0x14, 0xdb74e9e, 0x100000000, 0x0, 0x0, 0x3, 0x18}, [@FRA_GENERIC_POLICY=@FRA_OIFNAME={0x14, 0x11, 'syzkaller1\x00'}, @FRA_DST={0x8}, @FRA_GENERIC_POLICY=@FRA_FWMARK={0x8, 0xa, 0xff2}]}, 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f00000013c0)="195851d411f91c4d0b0fd7de56b1cf7dc4f8f141fb9c35241e4ab8cbbabde4188739106de1753f07bca0eedff297058c022209b10a6fa2ff3598e0536dbe6b693f11d6f7c1c20d653ce9bf0363e7bf61358bcec6ee854e47854719be7b40d7bc9333c98d84e5cf232ba25e4e95160d461bb92886de3d5abd012e94ab172278e5d94a0195457d411015a4a2646e9ea7afc81f78f804d00c46998eed544ee09e11e3a490a5bb78a5863e23de871c92a9b7ded39eba977ce49ee1c95d9bfd39d7291717e907b03ba8b5cf86b8f2417482f06b662610c5913431549ef2f4c913230c1815eb785cb3ffbedc2280523e14d809cc9f46ade9c0f528ebbaa23266b15f0cfe24d92647172e3981e4abc3906bca263f4f2a3596a55b48a15cbf197021a3523f5cfeb2573c80e16afe02fceb6843fc042f2963ca6a48c399ef3acee598094ab4a01994e7df1dd47f9a34079393103f5a3ac643676e2729c61ecf8a1cebcfa17ab6e01589af0f8371b75146a5fcf3e9a4d0b86007f46781b0b7c09ece0f834ddf708dae18ec68421a4ddd5cef73b3d6462d988e109a831bb17504a763443beaf440f0d291264d810ecdb164fe49b2bcc3d3bbf982b7376ecf1799844bdfb1c267458a33c6125c66562cdf8bb12bb29e8d2c1e05d8b7ea609961246e38b71bfced7b4e44983da28dcbbda451be6f04eb7482f4328cb53d4ba795f67586af8f1180c5999b2da3ed473fc7ce05a4e4bb010d4aa63c64e6df860be65dd598a9bc8f763b40e56dcfdcc23f0eddc004d37f8bb73a7ea17397d445be4d54bbcfe40a9c733aa25bfbceb2348bbd3b6012cb6ce92b9701f17015b2d548181fbac7b69c2997ac0ed73d84bc33389efc253cec6994996bf8dbb2bed32ecd2a830b038a157a23b43e99d547fb24219e97b236d39c8670e822971ebaec9edafba14b1b5addf3e71c2559511e00c0057079678e22a57075c306de57e06dd3c9278c2ca5d50545ef8d613fde51db63112d662f9a5826cd7b8fcb687120d05d94ead8f6ae29118ce98ec263831ac7ff053bc5920ddf67e41b65735315a5833b1bb912f2325c81e78f0528b0ab313b7b6f861d120730666ee51f8031171242cf109d62cc3e7b0dd318f75157770c9baf0cc3d89f4a1b9a27f59c4c0577a20030613202a7d327e097a1a2b2db557255b1683e9f92d0a8edd73cb9e88b1cf0f69dee2ef0a21171d86b0d04bd48089f4f33baf3dcaf2592dddb78c1e1a47d98cd5e90f8b76d47df3ea8f0981d501832a03d2dcf266f7446861aa94c1808041e0a95135b6d7d4a401d5026897d09763b8e6b380f0234de2b99382dad608cc87947c6ded4fb96535ec31f2755d88f8d6763df8a1a6e312998bfa916a8ed683446d38c1ad1cc343e1da6053d093ee355d963ebab7247c76a61ff57b9811dd3fd0736787509e328d648ca5b250c37057963269109cd1d103ce51945ba4afeaa68e39f0b93090a68f2b9f2ceb36f524644747998fcef2814f7f1199a0036fc2a0e626d351031321056661787a343e1e4421a2fccee0583c116d712551a96d43f9092befc465fb3264160ba6e9dd655162f0a373665bc339486cd73e5b5b440222fe8255a1918c97559e2215317b8a74f74595b0d6c6db8bb40c66bf5e36e3a91e7ec785e8b818bf6537ee3f9554ba813d7b75296524fbb7f48b72948e8287bee1f2911d78457c9caeb7a5431e43c859d1184ac8065dbfa3882bcf25d8b1f318a4e619630090d2571bc3f12e35e5542c3b0306af42ab1830208dba316ee5fa15c9e42773ee64cbd62214754e674deda6ff1fdc73be9ee71714b7cb8401e2bea8fe6e636efb995fac2e6412b09d21b8addfc4346b038f938a5c118876e5d7fd8c46714d20e83d5e6d63d087d0229c39a7f45d6617371d5c43ff0bd4b32ec1796f689c6554b8500f8b61e97bfa25a42468070cc0e2e836472bb56a8cf9f8d1d076c2871d948d3c888720f94a18cdc070bb82fcb97321df1b71390f30917f063be1ff1758abc3f6f148ce3205e0d98964a8f033c9de09d2a135c9f415620b33dd6c404cd5440c542f1cdf12022374da571848d6e5ccccb6106ef5cc855ccf3c5e10235dfe23d781c484117c165e3f5a86f49bcee9fc300307d99b84259bb2f765e46e2bbc57e50982fce43252bcaa06c6918982dadb04de8809b8dbb7f8294d46ba3e839c4a60fe485c4d00f9bdf96f7bb78f649c6c10a27c7235aa6eb41b1c084be23cfcf6182042e77c3671ec4779c622e9ecaff7d80cb9c50383d603784479697867b4fd67c54fe9b88ba19703e241d0f5ab0575e19a211349b37dc7aed58ecae6310d7a1378ecd64754876830ee0634be1a10ad638fbdc7f63292fa1c2d8311a1a9c00a86450020d7aa77aad5bd2470139214179c1c3302b64f57578a36dd5da22c239e440505155bc59b0f3f6085306ce3b03bafdf9d7779b6405d8eb8dc8a06db3c876e494d65fd17e1b6c859a15555c90ec4faa31d8890783b748522f395635344c2a458c27d1189c3caf06d78a35fe345217cd0c1877856c6e13f21c5a8841aa04320716b36b16e1ec63be19727d2795b92982091d0881c36c26ffc78109da8c7ad0ce2f9983636d894997f38335ee8dc3fa1305073653677e0c2419f901701608e6c93e2dbe988d24d4165fb687954eb639c5edc6491741fa389c29b303f690a011f31365f875c640af967835e8f2aac10f9a70338e7cfcb7d402e7a4cb60b3b08eab1ed21a88e12c59645d5877f07b0f717e2890f2cbc5da67c4f1c9d1c78f6dc67ab9794fc22398cfbbeaed45a630f0bc48b20ca7fd8bf93e10fe757c78a884d782856be70c3cf0e2dff646f76b05e5e6689ba86653db960ccf43ba07cae74d2bbebfbdbba966914fde9cbf3d93d315e95559e8c7126fbdefeddd9c8e035275175abeda0998a8a3bbb963a0e7f69e76cf930e0610336caedf299f1ca75c0ad23246cb4b34c9e6a662cf6e113ef879507b014cc951c5bd28b9c0f63a66f1b40c149242d34a5c7e311e788d31912e1ec655cf49d9bb79170fb8a981029ec059f4c61e4ab29759b320902f57a2aa4cbd51aa38ba36bf9e6108f16f1b3759b7c10b4314c8e8f6f69ac02f706415439560303059486f0a57e818b0a0faf5dff240528cc67cc318ade535198ce10123811fee86698bee15869f9e8628a79951567ed1284a161681f0740e081e744a561e837ebcd35e05cf103cddb3ba101160936cad49366aa8220ecd88f1de1744f4280c600eeeefea22b11fde35bcb477e1ffccb7563aa6aea520c362b4f841e46aca070c72103236756d9e808f4981030e9abf145a64696dd88e4fd8337a3ff4793848597d631f5453b8812ff99209c5477345a39507281de2ee026c2f914a2b389a43ccd921aab959b6ca92233ad315733c3350cd6c82b5f09d657bcdd21bff29337a8377d03b53345ac5da2058b1617c37c78d20dad13e992c28aba0e4f35026e77bbb1f481bff3b5d74a7e5486a6686599d46f96e870607987cbd2e0f56828a2da879187a8dc6db59a71dd14240e5f8b32130e299ce8363dcc64e34fe5e908bfb178e6c987ea5937da74810efc33faa09ce112adaa5798db03d954110128702dca3de2c72c75d74e7e9354de2a7e80c8396d3dac8683ead454aef9a1faafa1e12f0890008464dac301a0172b26dbd5c134ede8ff77b1943b25e805f8690796f1380a67cf50dd0c0b3255ba8773446bf608574183c21dbfeb949d10e965247591a892ef8eeefef3051abf1590d2dd92f8a0f5a2697fbb352015a864c86dbba0c11b203e4db7392e95c4c44a56cefc35b3406acca421b6f1d1b0128aa8f69ef59f587428f6ca423045655e16b961e5941daf3904e611c655bb98f931f727afb94a41ff3164348437f1ea73567b011f543e4226e97632d241f8e7a384d29e4ea31b605cb699dd08e22c5e4b8bd4f35b7484c075aa23580749b2d3ed6b9750506d40b3aff6b7249b0d076c9ee353c05f17a422f2fa4a936df0a591d02c12fe4ca6a2b721c3c66b67dc54ce4d01741b9fb509ce318d4161fc83e203f2220e7fdc4dcdf920ab2eefd4b2a7f90113a7097f00ddbc1cadde79e2fde8e3c163ac0bc286fccc194620826438d1d987e8dc20d344626d1df699e9d9410f3b460ea9af198a33697816a59ce7121f082e9d0ce8ae955cc250c684d494b2139357fbee46168fca48d8310e9966e289e4afabbb355b0629f981d49b789861206c38472b6c256f384a6ccb1f81b761c254cb2cdf388ed38c8f5ed5f98f939e0e59a750783b03b29bd67993fd2b6617ee5689a91fe8b6122f94325a63adb6aba4a70859cb09f5b9ec40826a3bd34bbd210d5231f23db8b5f7251346df27851494c33f8fd8cbe8f1f23bc48aa326f1139b277ee450214dd7e8b5c54b60be91a598c9b18ce76d244f7682a4fb052bcb245e6695012e426a7ceabf1bce558678afc6714d1224df899cdb0baed3da4441217c7c489f9e1a9c8ac059f9b5dcb46d389d70c329e38bc2b4637afd2e7b0ec49c52af5261358584eabf2152779e67211237f70e1706047fafdd672a202751e0aff4694ddf6f32a21c98218a6bf31c49428726f59900dfaaecbebce910c39a7bad8bef81d91a08ff1e103decd64adac6d7877ac9839a9ad95feeacbd9c9d32be2952c2a3fe2f6460c6f2f6a31db5a42d37c800e1229faede556a93bd3924a5edfc1102bdb1bbb0ae13692555688c0238f7561a3f596991f70307f666878b635f86ff1819aa90f820273419153abd7568fa0b3eac4182aec46938357c5f186990bdf3e445867042e1b91ffc2cd8530c757e084bd23c617eafbb209aa5c2e2f083701c6554a0e273f72dcfde05e9673844f6c34ca86b9deac13f41e22dc0113490c206da7247457340dc7294f83e907782b6a054d150e101d352e3efcc71577319d90b391ab52075154d6bfa04f89a0a5fc983b5dcf9eb21c9aed8a167baee67451b1c0f0fd1b9e4141d49dcb372fa9ceb8ad8c1ee2b78338332879854926321ece5efa617c66c493036123f73427121e4c1ccaace923435f43b1fdb37a1b71c96b72c77acac67fab5084efc7858a1cd070e584949e92de12fd65dc5e064fa3363fb5c11471e81e865739256cc60071ef16de0a66891d594babc0dbdad0266138d575094e7bc2a38b0e3fd7a9fd00ccf054554fc4e1090760cddf9a26668ab9ec9967b5a7dc46a2a34a6e043d184fa780528434be53d6cdb75f9598458b900685bd01e3230f88cdbb2a9f5073d8e7eb2ea298bb85769a479c2b75f279ffd6a5babd11d4565ff935b8ebe01ffae11f7c022e05a485b3f94ba01f0590acddf4ceb3bdc45dc556b0477bc99f8c257346f5b9fe29bef38f35d8c98778846fb2e71cf394e2a2b3313a10d1e4253da0ff2f9943424ecedcd1dcaebe90d9d4c6f9a9451d1d93b1a8a3dc4e6528c5c9a373ace006f1dde1210bd7c12d763c5280d3bf32d6a92edda1263e21d0f40144aac2b4fc11aeb661594e1a95b3844205ff36992b548542084949806466badb2b0db52b6835b555841c7876b088e1b87aaa3b475fabb264812be09d13e8965f34f1ae26ae4961fb0aaa3d756613d3cad46cb5ce84a0f04306ce686258cf2ba027ebf062e7962571eca83b3975134eaef715645e80f60de1dc14ed7bc9622d2b38bfff309dfd9a41cef71c77e4306bf48a7c291028b403f45aef94db39bd7d1ce6ef4351781d20f28fe37e345d5a6fe8c16827879001da6bd1e268e66ae691b1c80859ba5f475d9930b8c141") write$P9_RXATTRCREATE(r0, &(0x7f0000002400)={0x45aa5cb7cf6cacf, 0x21, 0x1}, 0x1b2) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0xaaaaaaaaaaaad05, &(0x7f0000001340)=[{&(0x7f0000000080)="84612d38745a27f547692f3601015cb875cf268fcd4f0622bf2f9c7896b5360c8ce35e", 0x0, 0x10001}, {&(0x7f0000000140)="27d718157973013d42f4107bba17bf5f8e5e60df9036156eda522c43a7a6d5397ce7c679f2b98632b7d6febccabed74543930018f61ee203d74f57827e1607272dc4e4b2c9c5f7749ce843522b350c52b04eb036e77c6b04093fe05f6b86d634379bf872de0615022a49954e79bfa0acd20d2e5c1f21c080f7b995a2e5564d8e467e7a9f79c47cb268391ebd48f338575c7cde68c7e32d234fb6140b47bc95c471afbe424a5a181bd1796a7e533c0083955bf69dd9b2a1247b5d13be5381ef97b30a0346f2f90543f6c75a7f2afcb3be604f5c98a2110d6fe420749403a3e3396c0323347d48b8b4e4f8d2aa36e7301c91197b6512e311814bce0aa8292cef41cada6e4038a7bc587b489da3a1f40cb8ba643f6918bba1156cba202cd04828b00fe8dd42e212959ff0ae37e86c9dfcf7a78e906bddd2cb741e743a47732a32f10e805e9b7e20914a1be4b816f8f6c8bd77c2a000d8fb9c04ddba2b898689f558fae6ed75d2f6cc18271e123c065e7646066cc0a097997ede1f1e52a3c83663174788db7a1977a9d85bdc03a748a75ed8cbc26e0c2aeffeb74e587b3758f3606dadd7de1e8ab9ec8a024cd98fabef161f6aef08f619017b3b91914b85286724918fdd4e499d66d6a84642245c495413ff405482d8cb62d9fb0516a98a876cf4652f0000906bd9b4dd78296e0d7acb077ad168b69b1449d4b6c865dce709cfc85f844a7cbdea39b7c4b75614f8dec29851c14873e5efc6a09c8737cea28c59723b36a94ece3a39be66c00755e0da6c80e679c60c62a40f4a09f917a47f529cd4fef80447063a036298c32597f97710a2c8a6458deb7eddbb6a28fb9822c14283f09590d71a73d938dff8ed35e5a045e983b75ac57dabe864a76a5462bae2dc98f32dcce5b25a1ecb36b51ddb1c61a07ba6aa47a0d298fc7a8127b35e82be4fcf8c9cb07537d222649a9f91aba66d654611bb5d0ec69af6bdf6cae2ac451682244dbb6362e6fd2e04a68527dfc545c813f79fbe396e6a5de7ce61dbe509b296e35a7ebaf4fb9d4814413523d3f17dbfc451e10d68c87398fc03948c34b6ca0f8f782a8fab00f62d65a53033e42f2409535ebb7be856708c5d3322cb15687acd5a4b5bc48e66dff40a9764e1b7f89e4018d38a9342f1e048a8a387359b5983bda6ece99dfb8aaa5dc32e01ccc2da6682b86517746959e94c85ae66cecdc12667516da31585c5933b3536b2c69e3917cefb3d54d4f9efd515eea59a181a062ec8f6f96c959da79041885456a23dce57dfd33f81be37c3852592e9abef654e4693918a2709e31ff32a479665e0c95778870d474e3cb04e326e264254cb1a312f62be40f7a9d3e0bc670ee414dd1eb3a38cc92ab97b03fa7f7b0d24c5d7caa8fba8e05a7f7b3853e5143642aa64832db1116eae1cedc61eeb9bff6299b05a2ce4de2c7228c02bf3816023ff506d1ce0a6e02ff9683286c4027169f6367bb90c96489be23b0ac585bd4634a47546275ebc8dcd9ba0de9d5ac8b8ef0fae0d6c3e6593a547d38b23adca942621ccf54315248a3877559f380fd47e138c94deb4ccaa2fe23db094315492a0113c047ac6ac84beb812b517fa748c34d8bd6e81682a93890932e7a3a23429947bafaceff8f472aeaf70bf78f741b7da4b826cfa218f6a2bddcc44c9c472c7e7bd560e42e9dc5fe95c38cfb4f561fcaf957091fe038a9afb77a2d7265624276b4d1e3089b1bb7718e6759abc277fc9200f79397797018f3c7ff7f69f2d5d194ab2c242a0f42c48774f8ba2204ed14f5f965ef609e7427d819d0a5f9124984150359ff44557c7922af0e8d03786c6e93e56eee1fdb23263ca2dea5ccb1983f30718ee1d1640fed5aa3f3ba0757830e3a41595805a50daf4a0e74c5595da3aa2ddf9243382ffe9fe2ae486553c549746c798baad00ac0d25b303630701a02f3d392443c0780ed8d6fd8d9db998eaa1e0f0d3330819e34079de0a14d7437ed96897cb3c9f2579066aab5c94c52994837cd13702e447487cb2189b990dbb03a29e7b094c4e2fd588122391f540ad22adbe4c952324dc040f43b156004d547a889d32e547362f371a599539cc77d1162b3a1610e8374a8fdf836e12520a3864b7c05175651b7646efe1637c01b52e63b282ac345db1a7ee3bc0d9017694853f41fc96f5fc3ebf605fca8ac8ec4610df57076792896b0e77862a506be892a317422ef8236bcb00b056be2cf4e76560c698ff002bddc6e8be3ca6b505bfb6d9c85d4419e7bffa038701eb624f03391cb3c5d6a24093d58eaee4c82b9c0d47802fd6f76ac6e927c9e152ed54ad6c968dc5a2a1a62f5bbf7984a52172e0c9a87e1da7e8149449792f77a0ce4779abf2759d469258a77a4a0b64df9910f3301fe8d75f18a3f303f8275d6d07eb90f13846cbd720b2079d2b03fb7fb7f46141897202b54ecf89999eeb8988cefcc40b1748c906bc75ef53c89e5acba462c8206f1a053fbfb5c5bdd7303f028e33ded1cb027a1b920bd3e1603d06b01bbe30c0ca79a12a993f0243a09b844e241d12d12a89e73cf0910787fa414afa5b412da0129d3407c35586c3131ccaee9f10c506a4b922e1633d715ce2630240923e23eb8793bddfe3b1c26e7dba1507b3f540a8df04ab18bddb77ddc8e1460482896dae955eb5f5160c4134d82c56410fb8146c44cd4719144d58a7e6dafb441c1b3f0a37af10b9aab9944d7200785a5061ad803e20af004cfdaa14a4c90a6b40b593cf40ccb040248b7ddafc4af5630a7e97486c747f1d26b05da004a53583210b4f97f2d976081145f6c8153adbd27d44921ad97413e2a6220291b3812c0367d8109c4f9622319e88b28f7942a5c57701f68d49049d8211f6b8aa0520acf21b2accec8dcfa418969b58221035c518d4acb3716eed275f772f632620a4aac8ff7a1e5f26a412846ed6d93db6315ba390940ea47128c86e1ed43dbe0da3fc4d5cb163d03e0971e332d8a28dd22853e3a40f40d819ea45408c170e74156cf5d6e1b56cd52e1f46a7afb2d7b59d2941108f4b75b3be75b5bc5da896ac434fb380917aa0a60f5b10751138b924a89730ba701103a46afe480fb9d5965a36313c1f0f5620635a077ef41a34bca4182ccbf5ce8fb9cdebf49286e2641e5269ab2ebd8ea68bdec99c4a7787ec9a8569e5f722d7ce77e524b87c17ae41a1b5419ae0fd445d0d3b99f71bfbf73b6c7cc12a22fa4ae0840311eddcb48a4502fd9add223fd56a3116762063b52504fab1d1628db4deab1c053358a6c5cb9e3984250cb57d0d35ee3ce370a3752f00c80211a92d78c4c38636a8efabcffa5e2aa1dc11fdff0658b47ebf77688824e49114ee4da58a813a832fd2b82403ef05b903cad8d96ea2d4cf0a52ba15df808e5aaf0f99ba19f4f386965f155b3738b639d1f7e8249d52bcec8851f37d7911e36ca9c90d3e529157804560323c74b283949c88abd7c3f894fc8a3728de2bc17c4314154c38f0154ffe0068061f3bcf921185865e314e7f3b3d4f2ba0e9a8932398f77ebfec3d76a312cfab10b55fc5e09480606529143e17d9af95357126d0438e13b6baf4305ff1de4c5b48f868f8a24f1046cb9662afdeafc4cfc12d013f0720fe4790402cbe6cb39e8bf63e896683a4fe5606e6afbf2d430fdea960b70ac1664fbe01de33c2a050c8b1f653499832917b843dac9451d45fd5ccca204957aceea3e482d67400fde5fe825cf9797fdd8e96359b40c0b54d2710fe77d1bb9f4728ca3890f1ad1b55453df8791a8c0ee3b47b54ba61ba941252ad3a719aca0e11f4f003528bb43160615db11a629b4d4ea17a4dc55b9a04f528bf4ed2156f4c551067c5db8f7bd2386c16757d686a42d0f159810a2219a581252d1fafadcfeea648afafc86fc099f4effcc4e15c465129d0dc47313f7eb7174a222bbc86c7977e043c17911f9a2641bb43addd452bfc679ec544f3d904867f553953d93d129cb546683c11c165f269ab9bb962480f655e5a89aa754dcfd3494a7c3ad56dc57500090ee34e29be7d361268c75ac00ff8ab77a8e99ffe2390d0dbeabfccf24b8404ae52a6a638f775d5d770c2a97eab8f59a9888007c2acdf32145c1ee6121f7d798e60f9c34f1e6cd1525b69a53c9d59d8cc4dd6ee0efee30a9229ae9bef498cd7e6c6248133267d1a49fa9ce540942938b3d1010052920de6df20d419a2867fde6390c7f250dcd58824fb7873d504750658db409e4a3150a243bfd18a5ce8f89d7f01f33c24170c2c1784437ae7e68528783f97d365c17d857c41ef415a6e2abdd29aea8584d1d6385caa546830384a2c1b8de8ef54182e23cbf36c8c0806a8407cb3117ce3ee548580be3f73140ca4ae3bcdc76d5f40a12fb8d73ca30adc33fe55d94897b2c472e519f68cf03432a6098169730d6268d557e6a79d3980905287be2e62decf5d156f1c3732b835ebedd414f51d3d09e7d5259aa732efaabeb2af58f119c034801892d09f525d6f78a32278e467df720f4bafe03004c95d465ec0278b4fb521d09e33d2432001e5877c1d536a04d11584fadcef15c5bd2f984117db9853d875538ff3e4617dce9222640d75992c07b3052afd9923724a2e744c9dd0916c314c658696e03c38eb176bccad18d3bb55f6b9295fd951f5dd45f5f77a187b9223879622dfe32d5b51dda7bdcc37205f451f89c6fef7ab7c6ad77c8e5b94e068776b27519b394170d4f64ad69999fdbe3495896f79b39f6dec4202b3ec5dea95362ef934912b7cb998ea5c0504da9c0a88156adbbc0844b313b7cbb1ab4699fa92a789a9909a9485e2657df8f04d03213ce256dd6aa8701070cad1a0343d5106dea2fb5181c054097bff0f1c0d390366679007ca630e0b74bf23e578ac305b33919def465e17a88bc5d956f2d669112a4ed8b2a07a1d9210124c6a8c2a70fa113cc88a5ad24db2be4468bff2eba05ba015845486a44f03488fee0f9cf26e6e5c7c2520d77c5802c8aee7884c18eba77f7a302f6f18bf8ed82735a343b2743d55ee7b73d3725a753736726e2dab4b1a7ce5b5947d0100b847fdd85c86205dff12b022f511ebf9701e526e4c83e636d47eb2a9bbc9955a0bcbcdbcefe8559a8c39e34ba2b586fdf61a54d3c82a2b2cf5bdfaf7ac7fb1d21bbe14071419d89ec4228f59eca238665cace34b01f8cc382f884fabd5ac758406208de90dbd74a45f7f042a37dc5d29e7e4257c6f80db0104bf661f432b0959fcf71457320e72e6829a192b02ede35a9bfba8f2c9eff916a36895f973462c06b5e20c562bddb104cbeffaaced22bdb1504a45fd393fa11f8d371a249eaff57a80a268021b6e4bdcb91cd4969de65643a160b807913214d7d54ece8b71cfb8ad5ccc25f5464874a33a5ca14bce63415cdf8fbeafb1c1971c780e6a737650c3881f3267ceb38608439ef3f238458862637d86d9203c6afbb98907c6b64cf2aa0e6cba4dc6bbea5478a306cb183051a9d192f7e239899c002956e2309c75018fd8f3d35f4acb4243a7be184591198b63df2d6c9bbcc4e151f8fe0a421820ea9ae3e3c78460da5c8caca1a7f377fc70e6b6f4db17d8c0a656726393158d99b08ffd97d42728305cddc5973aed6054d456861395e1705d36e80ff00aaf8307bef5270daeb374a37435931136101fa304e1c08b9847894e1c2bb42507d2508958ca2ec2c015179e6e7df2266cd9157520704984fca1781f28a84e4320acdb6001f562b861839d803e62700a66ecbed2cfe7613821a57be81cb185ce883554eb4981d46c"}, {&(0x7f0000001140)="2eb4d7f5ce489e7646639b26c19e2664e3b47846bee9d766ab0d75e9bc2fd86a15062de68dc84aadd61aa1d513d3d5fcf81d36fb88491138a9ba2d867c3b103d7e455da370e85b05102a46ce77768e5e24a3ceda0f1a8c1b262b45f842e53e510bae2c372a0be40a023536d1e3c193612b5450af4191cbf182c29806c01641e3ac46dfb74320ae8517eca7ef535c89d383", 0x0, 0xffffffffffffff39}, {&(0x7f0000001200)="f68a35d4ad3280649b263f2551d4f1fab46d70ac641b60e1e5cb1888e8e119815446c3c18a342a32092de781b212e73d8497796f81b28d8b1d407f796d409854d386920e2ae85c4cafc8435c905d61534d8d7a5406d9a0605f05fed59c434577d15999217d74c8342276a9fad21eb2ef1668dcfcbfc848d975a5c3c21f18af66b6950c7ae081b84b152d152d78c66315061bd106aeb8e4929eb64676a7", 0x0, 0x800}, {&(0x7f00000012c0)="9968055fcaa5f1c86769de471358894ce9b9d3f433707b3877f9f95580ba2d5116dc1462717d09a2004b81623e9fc858d164782ad51950c450fcf1bb38393667f76c8001eb635de865fb21a2c13f97c5dce255b9d3f8a25977", 0x0, 0x40}], 0x0, &(0x7f0000000000)=ANY=[]) 12:11:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534260011000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:11:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7a00, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 802.501113] XFS (loop1): unknown mount option [/dev/ppp]. 12:11:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x14, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:11:16 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000080)) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0xee2) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x12000, 0x0) setsockopt$inet_dccp_int(r1, 0x21, 0xa, &(0x7f0000000800)=0x6, 0x4) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x8000000000104, 0x0) ioctl$VHOST_SET_VRING_ADDR(r2, 0x4028af11, &(0x7f0000000480)={0x1, 0x1, &(0x7f0000000300)=""/107, &(0x7f0000000380)=""/11, &(0x7f00000003c0)=""/146, 0xd000}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') ioctl$KVM_PPC_ALLOCATE_HTAB(r2, 0xc004aea7, &(0x7f00000002c0)=0x4) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000004c0)={0x0, 0x9, 0x100}, &(0x7f0000000500)=0x8) ioctl$sock_bt(r2, 0xdd1f, &(0x7f0000000700)="0cbecd31ad1c2efca13de8c6a544bb4926ae5a733ae6987f68dc853fa827ac44e701d04c51b2f84c2e31cad63486139822ed75c209d3b5bd3e3d7144c124293a8a1fb6eb11eb93cd78b17ff1f83f216e613c58184e2fcee1de2e30001b7378bdce05eb55456d3833ee46440b432ce4b3b2fa5123e701a043ec8d821d621fe8300e4a0e30eaf07b67d0f3ddbf23c1c5b47412a56f23ec2a677417309d64b3648ee5ecf048a65520ba35c7d39edd547912328ee314b3615f48d366cc21c5c6d46a536618a6c720b337442e7101468b0bcb61938a80c65c71133561ea6b16e10105e498118c4fe3827b74d7bdc715") getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000540)={r4}, &(0x7f0000000580)=0x8) add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600)={'syz', 0x3}, &(0x7f0000000640)="66a63dced0933c75dc0139ce88865b31dd71f677b9ffc5f9027d", 0x1a, 0xfffffffffffffffa) shutdown(r2, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000200}, 0xc, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c000006", @ANYRES16=r3, @ANYBLOB="00d926bd7000fbdbdf2502000000280002001400010000000000000000000000000000d109c31476a90600060000000886b1c193432af87cfc0e5f28280c0696276438b09bdf9a010000000000106ead37f669ef1340a9903c6dfe960000000000"], 0x3c}, 0x1, 0x0, 0x0, 0x10}, 0x40000) [ 802.615161] XFS (loop5): SB sanity check failed [ 802.620130] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 802.667367] XFS (loop4): SB sanity check failed [ 802.673303] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 802.706183] XFS (loop5): Unmount and run xfs_repair 12:11:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) [ 802.746635] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 802.762843] XFS (loop1): unknown mount option [â]. [ 802.783371] XFS (loop4): Unmount and run xfs_repair [ 802.803512] 000000003581ce55: 58 46 53 42 09 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 802.823775] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 802.887469] 00000000a2e70939: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 802.898825] 00000000e9ba5ef3: 58 46 53 42 60 01 10 00 00 00 00 00 00 00 10 00 XFSB`........... [ 802.910478] 00000000c0a10aaa: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 802.919709] 0000000060972ba4: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 12:11:16 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x5, 0x4, "1dc01d0d8a5f466e71fa66207e6fb34586ffffb86dbd04d2559958d1c9118d6c1a1744dc10534d25d3b055c00134a238b5308c611ca282b5929f6270e09e42e4", "77bf59e1440528027cd9e5988d2dc0357c76a053329744a18134222261cc4ae0", [0xfffffffffffffff8]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xaaaaaaaaaaaab4c, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) [ 802.944753] 00000000eb489259: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 802.955116] 000000009e4b5edf: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 803.026256] 000000006648947e: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 803.036593] 000000002615ba9f: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 803.098505] 00000000747ca28d: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 803.111135] 00000000c165264b: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 803.183999] 00000000ec0003f4: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 803.195623] 00000000c837a241: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 803.266052] 000000000998f1fd: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 803.277387] 00000000652d718a: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 803.294360] kworker/dying (30) used greatest stack depth: 14048 bytes left [ 803.344233] XFS (loop5): SB validate failed with error -117. [ 803.349876] 00000000bb57d01c: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 803.363530] XFS (loop2): Mounting V4 Filesystem [ 803.374841] attempt to access beyond end of device [ 803.388201] loop2: rw=4096, want=2036888240641, limit=264192 [ 803.412013] XFS (loop4): SB validate failed with error -117. [ 803.419375] XFS (loop2): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 12:11:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="584653420f001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 803.458327] XFS (loop2): empty log check failed [ 803.463582] XFS (loop2): log mount/recovery failed: error -5 [ 803.465281] XFS (loop0): Invalid superblock magic number [ 803.475583] XFS (loop2): log mount failed 12:11:17 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r4, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) flistxattr(r2, &(0x7f0000001200)=""/158, 0x9e) pipe(&(0x7f0000000040)) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0xfffffffffffffffa, 0x400, 0x2, 0x7}) openat$full(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/full\x00', 0x202000, 0x0) unshare(0x40000000) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001500)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000001700)=0xe8) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) 12:11:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x6900, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:11:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x23c, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) 12:11:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) [ 803.610947] XFS (loop1): unknown mount option [/dev/vcs]. [ 803.613110] XFS (loop5): unknown mount option [/dev/loop0]. 12:11:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffdf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x800, 0xffffffffffffffff, 0x1) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) 12:11:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="584653420e001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 804.064856] IPVS: ftp: loaded support on port[0] = 21 [ 804.080745] XFS (loop5): unknown mount option [/dev/loop0]. [ 804.119972] XFS (loop1): Invalid superblock magic number [ 804.146753] XFS (loop0): Invalid superblock magic number 12:11:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200231000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:11:18 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=r0]) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0x9d, 0x2, 0x1, "dfef3471ee97fbdb66329d6b9dcbefb4", "3c4b26ecbe61b2fb33786b9371cf3f5b1dc2b64c21fceefd33693d0c7329e30d2a1bb78d8a7c4cc1b14bf8e81900f7bae31dcbf068e01ea812211a573a9e383aef1aafc8480c13b6b5af472dca277f6c987e214942437b7c469db9cbe1dabecc0f900b411d23595ac3eee2efa9654189e549a05a14c777b7c99cfb00552df6750795f071d9d33c45"}, 0x9d, 0x3) 12:11:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 12:11:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4c00, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 804.443236] XFS (loop1): unknown mount option [0x0000000000000003]. 12:11:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xae, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) 12:11:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x6d00, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 804.674105] XFS (loop5): SB sanity check failed [ 804.679009] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 12:11:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 804.799457] XFS (loop5): Unmount and run xfs_repair [ 804.839669] XFS (loop5): First 128 bytes of corrupted metadata buffer: 12:11:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) [ 804.893769] 00000000496fc8bb: 58 46 53 42 00 23 10 00 00 00 00 00 00 00 10 00 XFSB.#.......... [ 804.926981] XFS (loop1): Invalid superblock magic number [ 804.971278] 0000000078a47db3: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 12:11:19 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0xffffffffffffffff, &(0x7f0000000000)=ANY=[]) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000000240)=0xe8) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x18030, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap='mmap'}, {@loose='loose'}, {@access_client='access=client'}, {@version_9p2000='version=9p2000'}, {@version_u='version=9p2000.u'}, {@cache_mmap='cache=mmap'}], [{@obj_role={'obj_role', 0x3d, "6367726f75702c24776c616e31706f7369785f61636c5f6163636573732c2b76626f786e657430217b7d6b657972696e677da8"}}, {@euid_lt={'euid<', r2}}, {@subj_role={'subj_role', 0x3d, 'cpuset%ppp1ppp1.lo'}}, {@dont_measure='dont_measure'}, {@appraise='appraise'}]}}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000001bc0)={0x0, 0x76, "876bcfd620ea81d3d46a5e88ea252f95027dc2a25fca02367f097d5503d968a099676b8d4891da266b795d2ef864355b0b49875742e0f432d7be50bbeb769986a0c0e18ec7905b4375858d754343d344cc3447b7755937c9a0afc8bf3e1c8bf91a9a3fb8469fae13b25c4e8234134f356486ac42322e"}, &(0x7f0000001c40)=0x7e) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001c80)={r3, 0x800}, &(0x7f0000001cc0)=0x8) syz_mount_image$ceph(&(0x7f00000003c0)='ceph\x00', &(0x7f0000000400)='./file0\x00', 0x3, 0xa, &(0x7f0000001a80)=[{&(0x7f0000000440)="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", 0x1000, 0x9}, {&(0x7f0000001440)="16633646a19d06b7cfe3", 0xa, 0xffff}, {&(0x7f0000001480)="53eb3c5f115e3a1a1bf9c691428bca3d0c5198fb182146b487a315fe7f8ce3e1ae7bc6a73ddbe70b22a15ff63a5d7e325039092fecabb4084e2a3d0e79fe5c2bafb189e16bbdbbbcb8b4e703cca2a7fbe635fe3020fc642808838578518da26e0f3948098e3dc3ff9794f29d91137b482c11c09f0bf9030ad211650c8263f73ccfd44ac4c650c06930f9a54881f2ca5d9d1e9751986fe72a53cd109ba6a94e65b9519d9fbaa9e02e99f0d32bf0579561608bb364cd2215d33c54c9e8f5d297d0091e3e3ffe4715fa958edc2322538f4746cd811a5ca80e642531ec330aa0a2b93b87cc3757a64069e2524b50", 0xec, 0xbf1b}, {&(0x7f0000001580)="e2f1de5ae7c3a5e7e68879d9a1c2c62d9419befffa26899f11a0c65febd0b79a3ba7f89a8e7d75ab8188c7792d77714063ebdcabe05c4a239a24b4acc6700a8ed75f77d2427b248e6da144c40a4648", 0x4f}, {&(0x7f0000001600)="dcfce07233bf7732483f5a57c42ee40bd40aadfc9f7ee0d0499dcdd446449643271fe208c6ea23b6075ef2c9f6d57df9fc30a9322ee7781fd9a73054769cb263b5a71949044b959749d558ed730d2c9c0f06bcee6a796119", 0x58, 0x7}, {&(0x7f0000001680)="bb5622e5c9a91a82d5e2c836bb1e84d8945fccb45392066e1c9452cc7aadc92a0b8af7e1288fe2233f6b128beccb9ec4850b844f7ae2914b7043216116055d5bdf15c919fc04542ed28d80ebef99d7ba11215d3049ca5eee2bf78c2c7f867a112f5f158baa8a3eb8dc5ff353406ed394fcbe7d9ee39550ee59c36ac9bf08ec6b1c8f10470503b079e55a589489b70d2009da963745fd95f24697ec7a7c55f4dd58de5ad40f3e4b7bda2a7171a01654ed9d45c850ccae93d0d56c635a531d557170d61217fe959b960116fd2470ea44c3232708cd5ece", 0xd6}, {&(0x7f0000001780)="29ed10db772e81e33c5dd424d4e1f65b918516b1bfe156cbd2e5b75252058e0cd576dace440bedf2ed9b9a5d7eecb83a3f5ac2645ec4311e11b3a9bf98e160cbadbc16eb10a7f8c5133112681f9e24dddfb94b8d03c7c6b67254a973ffd4438591131fb74f69226d11342abb586d752e27a003042e7b826a9aa40fd7b2bb1adbc2c5c811a683bdbbfd2e2b1140cac980496e70", 0x93, 0x4}, {&(0x7f0000001840)="3c00f25a89e21d91f5e78c05c36b64b0ac9768278ffaab3bf60bbe494bced13a082025c43ae6d4083d73db4a62ba7519cb20967ade59d63db88340c5e34ee8e00d4208be8a2f9f117a763d5668172b9a638870a80b52edabd3e71c589ade77c21208427ae8001ccaa10e47c12d810a94df328d7471f8666b683569e5d0c6a747a41ccbb447759991ddf2aea0538a8a4a18ff92ac5d533bba82aed8f2078d71cd6be3fb4bc0fe7fd69eea8340cdf8093469b01d8aab57a12bb5131cbada26ad8c51eb0f50f29b7a921c01", 0xca, 0x81}, {&(0x7f0000001940)="57c2b692beb02fbe0c588de7724dee6a0f2757a0fd5c5a2713452c851c79f1a0e97639609b5a27dd5bd64fc16c4abf630c45764a7479fbdba858ae8c0c09a8127e475480e217016bdb", 0x49, 0x7}, {&(0x7f00000019c0)="c93d9457061b0cd4d8454f23ff0c95a110b3d4be8e195ed00b932c186444c3acc2fa64d3e86d1798cc706d8ca0bd6d365bfff903330e39f4db3afd671af326f23a67133f58c762f7635d9d8ef1a76d60d603a00d3cd37ba47e072b17fcdb761f07f1c7ed43c4468f3ef40e112321ce8d3d545ec9862f22baff6d021e5b1f8563ed007aa9ad2a58c1eff09c2807cf82e01fbbaa4343f9c6f3519f9b66313307c39e1ed544b1062d429e9e168481b026cd05ab83209043dce28c", 0xb9, 0x4}], 0x800, &(0x7f0000001b80)='cpuset%ppp1ppp1.lo') [ 805.066233] 000000004b628b0f: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 805.116378] XFS (loop4): Mounting V4 Filesystem [ 805.146675] 000000000185c3ba: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 805.174967] attempt to access beyond end of device [ 805.206851] loop4: rw=4096, want=2036888240641, limit=264192 [ 805.221903] 00000000e8639916: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 805.270713] XFS (loop4): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 805.325663] ceph: device name is missing path (no : separator in /dev/loop1) [ 805.335301] 0000000033ef4aa4: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ 12:11:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x74, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 805.378981] XFS (loop4): empty log check failed [ 805.437127] 000000005ea94920: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 805.447257] XFS (loop4): log mount/recovery failed: error -5 12:11:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x8100, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757844fd6c792316999c81e3902d6e40ed267c9446b15bce685f3b0f12fcc91fd875e451408720d3a9304563c17c34968440ace770121264465d299d7cda157a4415fd83f27d3616732dc9b8ecea552ba052af1b65e700000000000000009b21c93c504ee6fbec513b8b48dff99c7f5855d2ed"], 0x7f) 12:11:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) [ 805.513624] XFS (loop4): log mount failed [ 805.525641] 00000000fcda557c: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 805.613611] XFS (loop5): SB validate failed with error -117. 12:11:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534201381000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:11:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x4600, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:11:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) [ 805.704706] XFS (loop0): Invalid superblock magic number 12:11:19 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r4, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) flistxattr(r2, &(0x7f0000001200)=""/158, 0x9e) pipe(&(0x7f0000000040)) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0xfffffffffffffffa, 0x400, 0x2, 0x7}) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/full\x00', 0x202000, 0x0) unshare(0x40000000) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001500)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000001700)=0xe8) fstat(r5, &(0x7f0000001800)) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) 12:11:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffdfc, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 805.905516] XFS (loop5): unknown mount option [/dev/loop0]. 12:11:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) [ 806.037281] XFS (loop5): unknown mount option [/dev/loop0]. 12:11:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534218890300000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 806.187944] XFS (loop1): Invalid superblock magic number [ 806.205730] IPVS: ftp: loaded support on port[0] = 21 12:11:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) r0 = memfd_create(&(0x7f0000000000)='xfs\x00', 0x3) ioctl$RTC_IRQP_READ(r0, 0x8008700b, &(0x7f0000000080)) 12:11:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) [ 806.673522] XFS (loop5): SB sanity check failed [ 806.678408] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 806.680055] XFS (loop1): Invalid superblock magic number 12:11:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 806.751813] XFS (loop5): Unmount and run xfs_repair [ 806.777458] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 806.809583] 00000000c46aeac5: 58 46 53 42 18 89 03 00 00 00 00 00 00 00 10 00 XFSB............ 12:11:20 executing program 1: socketpair(0x1, 0x1, 0x8, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000080), 0x10, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=r2/1000+10000, @ANYBLOB="01000060010000000200004038030000827f46eedf8baa0ef95d5a06a970e8ff692d144960f5bf8f4ceaa50bbc83c96dfc84c804f377ae0720756a7ff72bb92f7344cb441f3df1eb3835ce4c4e1cd9ea"], 0x80}, 0x1, 0x0, 0x0, 0xc000}, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) [ 806.866449] 0000000015ef52dd: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 806.882098] 00000000aed7cf57: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 12:11:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x22000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 806.911377] 00000000a840bf5d: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 806.949300] 00000000a5c9ca35: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 806.992095] 00000000a89ef1b0: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 807.002081] XFS (loop1): unknown mount option []. [ 807.038752] 0000000023d51fb9: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... 12:11:21 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000001500)='\x00') r1 = accept4(0xffffffffffffff9c, 0x0, &(0x7f00000015c0), 0x800) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000013c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000014c0)=0xe8) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xf251, 0x5, &(0x7f0000001340)=[{&(0x7f0000000140)="eb37fdc54cd58b8f2363f6d87ff8795ceceac2995f7e543ca35f5cd11062617cf81b23b9c9014a3d6a6838e64bef0932e97d5f97096614be503969bb48609a1ef04ce826b4c990a1d2868705a37d6fc85b090306828b0e82ea8e94570f333f772e36787ba7041646d618e31e5c565cc4a79c694318bdaa8d52cf9166ecf658ffa9d1b4aa758bcedc3dd2f46dd3da0ca6d81278c4f826fcf80d91cdc37dad812a3401298f0900ea3be40f94d1a983432624e388c8b098610784d5b6b1dd7c8b1ad8f750e2c3b93823403d9e87f4120e0aabbb", 0xd2, 0x3}, {&(0x7f0000000240)="b8fdd080ccd72e3f9449eec7ebdea60b1eabeda2d3a164aae94078eda7b0daf6e2e9d2191677cc6629e81f88f54c3ee21cd716a00c8a1b9c28874bab48c2ddcaafacd5d1", 0x44, 0x1}, {&(0x7f00000002c0)="3d8428520a19321bb4cab385e1af68bbf164d4b89e3d5661afac2f15c880962ff07d2b2fee54627e91d1e51fb853dd9e5911951468cff3ac7d4b4564146efdb1859e44ec0ae7349831a1062b", 0x4c, 0x1}, {&(0x7f0000000340)="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", 0x1000, 0x80000000}, {&(0x7f00000000c0)="8dae47f7eccaf92fbe0b71ddbeca85fcd56e3b166e9c72ed8e64cd41bb1abc4b6158e6c26ff1dcec935a84e2caaa7908049bd2", 0x33, 0x1}], 0x20000, &(0x7f00000016c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r2, @ANYBLOB=',smackfsdef=*-$\';eth1\x00keyring,\x00']) [ 807.080501] 00000000ef5734dc: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 12:11:21 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r4, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) flistxattr(r2, &(0x7f0000001200)=""/158, 0x9e) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0xfffffffffffffffa, 0x400, 0x2, 0x7}) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/full\x00', 0x202000, 0x0) unshare(0x40000000) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001500)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000001700)=0xe8) fstat(r6, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r5, &(0x7f0000000140)='./file0\x00', r7, r8, 0x1500) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 807.138524] XFS (loop5): SB validate failed with error -117. [ 807.146687] XFS (loop2): Mounting V4 Filesystem [ 807.158552] attempt to access beyond end of device [ 807.188779] loop2: rw=4096, want=2036888240641, limit=264192 12:11:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534230890300000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 807.234454] XFS (loop2): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 807.262590] XFS (loop1): unknown mount option [xfs]. [ 807.321111] XFS (loop2): empty log check failed [ 807.347213] XFS (loop2): log mount/recovery failed: error -5 [ 807.377147] XFS (loop2): log mount failed 12:11:21 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsync(r0) r1 = syz_open_dev$adsp(&(0x7f0000000280)='/dev/adsp#\x00', 0x1, 0x400040) write$FUSE_BMAP(r1, &(0x7f00000002c0)={0x18, 0x0, 0x3, {0xfffffffffffffffe}}, 0x18) fadvise64(r0, 0x0, 0xffffffffffff0001, 0x2) epoll_pwait(r1, &(0x7f0000000300)=[{}, {}], 0x2, 0x95e, &(0x7f0000000340)={0x2}, 0x8) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) r2 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)="c65eb75c1643ad4f39e40dc33c87214ba3fb7850cf697144b01df0d27a7c0a04732eaff429376c7a7c02502d81ba081d15646eadffa157d3768d5b0e71c039fa404952edf9a266463c3faaeaac54b23f32e543fee1dd2f9db519ec5fea39b2ee4886358e23c4e4e028c9abf19c8c0557200a98899b0aa17cb49046cdad27d706dba914068a4a9639afcc3c469c3e601da02930d7ac30154ec359edd4b4c550821646345bebf41cbf91162c8ca331941fe7bfffd901c2e88a0f547cd010b1a82ad04579690fd067feebbf5d84c4ec091954f82d047636de6396007b8b05eb4cf3c846a7c91fd2492f077892595c8336", 0xef, 0x0) keyctl$clear(0x7, r2) 12:11:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:11:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff]}) [ 807.595188] XFS (loop5): SB sanity check failed [ 807.600095] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 807.668896] IPVS: ftp: loaded support on port[0] = 21 [ 807.709650] XFS (loop1): Invalid superblock magic number [ 807.722132] XFS (loop5): Unmount and run xfs_repair [ 807.745874] XFS (loop0): Invalid superblock magic number [ 807.808221] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 807.824897] XFS (loop1): unknown mount option [keyring]. 12:11:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x8000, 0x0) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x3ff, 0x410082) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f0000000080)=0x1) [ 807.888837] XFS (loop2): Mounting V4 Filesystem 12:11:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3f0, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 807.941092] 00000000f52c823c: 58 46 53 42 30 89 03 00 00 00 00 00 00 00 10 00 XFSB0........... [ 807.947273] attempt to access beyond end of device [ 807.951497] 00000000376d4235: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 807.971117] 00000000a7ea86cd: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 807.984480] loop2: rw=4096, want=2036888240641, limit=264192 [ 808.066151] XFS (loop2): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 808.070212] 0000000034610fb7: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ 12:11:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) [ 808.162399] 0000000049c312de: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 808.218672] XFS (loop2): empty log check failed [ 808.223792] 00000000bcb80dc0: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 808.256325] XFS (loop1): Invalid superblock magic number [ 808.256479] XFS (loop2): log mount/recovery failed: error -5 [ 808.293843] 0000000061a19c22: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 808.357777] XFS (loop2): log mount failed [ 808.374947] 00000000810a6f3a: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 12:11:22 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r4, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) flistxattr(r2, &(0x7f0000001200)=""/158, 0x9e) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0xfffffffffffffffa, 0x400, 0x2, 0x7}) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/full\x00', 0x202000, 0x0) unshare(0x40000000) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001500)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000001700)=0xe8) fstat(r6, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r5, &(0x7f0000000140)='./file0\x00', r7, r8, 0x1500) flock(r3, 0x0) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) 12:11:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) r0 = accept(0xffffffffffffff9c, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000140)={0x0, 0x41, "e8aa6273278d9ad0190dd48b8fb57630322640d3abfcc97477f401421788a479fbc7ed918c12784fd9487b896dad53ef26915ad10e7c91b2af7f41bf1a6f5846a9"}, &(0x7f00000000c0)=0x49) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000400)={r1, 0x0, 0x7fff, 0x215, 0x0, 0x474, 0x0, 0x0, {r1, @in={{0x2, 0x4e21, @remote}}, 0x7fff, 0x6, 0x1, 0x3, 0x17d}}, &(0x7f00000004c0)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000300)={r1, @in6={{0xa, 0x4e24, 0xc4, @remote, 0x81}}, 0x7, 0x401, 0x6, 0x5}, &(0x7f00000003c0)=0x98) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e21, 0xffffffff, @mcast1, 0x7ff}}, 0x5, 0x4, 0x1, 0x2, 0x4}, &(0x7f0000000280)=0x98) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000500)={0x8de, 0x7, 0x200, 0x5, 0x310, 0xffffffff, 0xec, 0x1f, r2}, 0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@assoc_value={r2, 0x8}, 0xffffffffffffff47) [ 808.424394] XFS (loop5): SB validate failed with error -117. 12:11:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0xffffff1f, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:11:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 12:11:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534250011000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 808.619223] XFS (loop0): Invalid superblock magic number [ 808.696461] IPVS: ftp: loaded support on port[0] = 21 [ 808.773559] XFS (loop5): unknown mount option [/dev/loop0]. 12:11:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200201000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 808.829324] XFS (loop1): Invalid superblock magic number 12:11:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:11:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4c, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 809.042054] XFS (loop5): SB sanity check failed [ 809.047226] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 12:11:23 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000]}) [ 809.185773] XFS (loop5): Unmount and run xfs_repair [ 809.225888] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 809.251130] XFS (loop1): Mounting V4 Filesystem [ 809.267848] 0000000021fc9b33: 58 46 53 42 00 20 10 00 00 00 00 00 00 00 10 00 XFSB. .......... [ 809.304311] attempt to access beyond end of device [ 809.314037] XFS (loop0): Invalid superblock magic number [ 809.340817] 00000000bf6ef621: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 809.341648] loop1: rw=4096, want=2036888240641, limit=264192 [ 809.419058] 00000000f5a8b47e: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 12:11:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x5e00, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:11:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xff0f000000000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 809.463916] 00000000faeea42e: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 809.476670] XFS (loop1): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 809.508885] XFS (loop1): empty log check failed 12:11:23 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r4, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) flistxattr(r2, &(0x7f0000001200)=""/158, 0x9e) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0xfffffffffffffffa, 0x400, 0x2, 0x7}) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/full\x00', 0x202000, 0x0) unshare(0x40000000) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001500)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000001700)=0xe8) fstat(r6, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r5, &(0x7f0000000140)='./file0\x00', r7, r8, 0x1500) flock(r3, 0x0) getpeername$unix(r5, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 809.558904] XFS (loop1): log mount/recovery failed: error -5 [ 809.580104] 00000000325e2504: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 809.621699] XFS (loop1): log mount failed [ 809.669779] 000000007462f2b3: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 809.816559] 00000000e92970d5: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... 12:11:23 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 12:11:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 809.966794] 000000001cc56977: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 810.032012] XFS (loop5): SB validate failed with error -117. [ 810.048090] IPVS: ftp: loaded support on port[0] = 21 12:11:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="58465342004c1000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 810.245182] XFS (loop1): Mounting V4 Filesystem [ 810.285553] XFS (loop2): Invalid superblock magic number 12:11:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x4300, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 810.424264] attempt to access beyond end of device [ 810.429380] loop1: rw=4096, want=2036888240641, limit=264192 [ 810.445268] XFS (loop1): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 12:11:24 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 12:11:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 810.471759] XFS (loop1): empty log check failed [ 810.487110] XFS (loop5): SB sanity check failed [ 810.492102] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 810.503887] XFS (loop1): log mount/recovery failed: error -5 [ 810.585482] XFS (loop1): log mount failed [ 810.628854] XFS (loop5): Unmount and run xfs_repair [ 810.675911] XFS (loop5): First 128 bytes of corrupted metadata buffer: 12:11:24 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r4, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) flistxattr(r2, &(0x7f0000001200)=""/158, 0x9e) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0xfffffffffffffffa, 0x400, 0x2, 0x7}) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/full\x00', 0x202000, 0x0) unshare(0x40000000) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001500)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000001700)=0xe8) fstat(r6, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r5, &(0x7f0000000140)='./file0\x00', r7, r8, 0x1500) flock(r3, 0x0) getpeername$unix(r5, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 810.762366] 000000003b4a8879: 58 46 53 42 00 4c 10 00 00 00 00 00 00 00 10 00 XFSB.L.......... 12:11:24 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r4, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) flistxattr(r2, &(0x7f0000001200)=""/158, 0x9e) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0xfffffffffffffffa, 0x400, 0x2, 0x7}) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/full\x00', 0x202000, 0x0) unshare(0x40000000) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001500)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000001700)=0xe8) fstat(r6, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r5, &(0x7f0000000140)='./file0\x00', r7, r8, 0x1500) flock(r3, 0x0) getpeername$unix(r5, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000001340)={0x4, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x14}}, {0x2, 0x4e22, @rand_addr}, {0x2, 0x4e21, @multicast1}, 0x4, 0x1, 0x0, 0x80000001, 0x6, &(0x7f0000001300)='eql\x00', 0x1, 0x101, 0x91f3}) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) [ 810.857885] 00000000c1ad8c47: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 810.945036] 0000000055f2b2dd: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 12:11:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) [ 811.117203] 000000002bfdce20: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 811.234146] IPVS: ftp: loaded support on port[0] = 21 [ 811.240780] 00000000d19d2ed2: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 811.261335] IPVS: ftp: loaded support on port[0] = 21 [ 811.297198] 0000000037d3dfe5: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 811.330111] XFS (loop2): Invalid superblock magic number 12:11:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x780c, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 811.433009] 00000000e0fb1e30: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... 12:11:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x12fab, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 811.548204] 00000000290ddc46: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 811.617637] XFS (loop5): SB validate failed with error -117. 12:11:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200091000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:11:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) 12:11:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 812.140687] XFS (loop5): SB sanity check failed [ 812.145569] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 812.262664] XFS (loop5): Unmount and run xfs_repair [ 812.268753] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 812.276931] 00000000849a6d4b: 58 46 53 42 00 09 10 00 00 00 00 00 00 00 10 00 XFSB............ 12:11:26 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) [ 812.393598] 00000000b5573864: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 12:11:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x4400, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 812.474228] XFS (loop1): Mounting V4 Filesystem 12:11:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3801000000000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 812.518687] 00000000ad84b8c6: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 812.529564] attempt to access beyond end of device [ 812.577275] loop1: rw=4096, want=2036888240641, limit=264192 [ 812.607377] 000000003b9cf59a: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 812.642127] XFS (loop1): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 812.642282] XFS (loop1): empty log check failed [ 812.691464] 00000000e86345cd: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 812.721208] XFS (loop1): log mount/recovery failed: error -5 [ 812.749822] 00000000331fdfad: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 812.774754] XFS (loop1): log mount failed [ 812.818718] 00000000177921f8: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... 12:11:26 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff00000000]}) [ 812.872842] 00000000c0bf090e: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 812.974495] XFS (loop5): SB validate failed with error -117. 12:11:28 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r4, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) flistxattr(r2, &(0x7f0000001200)=""/158, 0x9e) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0xfffffffffffffffa, 0x400, 0x2, 0x7}) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/full\x00', 0x202000, 0x0) unshare(0x40000000) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001500)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000001700)=0xe8) fstat(r6, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r5, &(0x7f0000000140)='./file0\x00', r7, r8, 0x1500) flock(r3, 0x0) getpeername$unix(r5, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) 12:11:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:11:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="58465342004c1000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:11:28 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff]}) 12:11:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x2e00, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:11:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4000000000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 814.576377] XFS (loop5): SB sanity check failed [ 814.581792] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 814.618444] XFS (loop1): Mounting V4 Filesystem [ 814.652429] IPVS: ftp: loaded support on port[0] = 21 [ 814.673577] XFS (loop5): Unmount and run xfs_repair [ 814.689463] attempt to access beyond end of device 12:11:28 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) [ 814.714104] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 814.722547] loop1: rw=4096, want=2036888240641, limit=264192 [ 814.772882] 000000002ed7a0eb: 58 46 53 42 00 4c 10 00 00 00 00 00 00 00 10 00 XFSB.L.......... [ 814.775477] XFS (loop1): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 814.785590] 00000000f071df09: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 814.805060] 0000000072966650: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 814.814594] 000000006b468722: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 814.824200] 00000000f1f055dc: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 814.839018] 00000000cd612253: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 814.867582] 00000000f8cdf683: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 814.891568] XFS (loop1): empty log check failed [ 814.904889] 0000000093b749fb: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 814.915808] XFS (loop1): log mount/recovery failed: error -5 [ 814.955710] XFS (loop1): log mount failed [ 814.960718] XFS (loop5): SB validate failed with error -117. 12:11:29 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 12:11:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000389180000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:11:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x8300, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:11:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) 12:11:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:11:29 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r4, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) flistxattr(r2, &(0x7f0000001200)=""/158, 0x9e) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0xfffffffffffffffa, 0x400, 0x2, 0x7}) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/full\x00', 0x202000, 0x0) unshare(0x40000000) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001500)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000001700)=0xe8) fstat(r6, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r5, &(0x7f0000000140)='./file0\x00', r7, r8, 0x1500) flock(r3, 0x0) getpeername$unix(r5, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) dup3(r1, r0, 0x0) [ 815.581995] XFS (loop5): SB sanity check failed [ 815.587779] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 815.614161] XFS (loop5): Unmount and run xfs_repair [ 815.626128] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 815.646560] 000000000861722b: 58 46 53 42 00 00 03 89 18 00 00 00 00 00 10 00 XFSB............ [ 815.704642] XFS (loop1): Mounting V4 Filesystem 12:11:29 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) [ 815.727794] 0000000069a07014: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 815.778902] attempt to access beyond end of device [ 815.808968] loop1: rw=4096, want=2036888240641, limit=264192 [ 815.835606] 00000000b4ef3511: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 815.851947] XFS (loop1): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 815.916093] IPVS: ftp: loaded support on port[0] = 21 [ 815.916556] 000000004c5fc196: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 815.950582] XFS (loop1): empty log check failed [ 815.988559] XFS (loop1): log mount/recovery failed: error -5 [ 816.031631] 00000000f66ada52: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 816.042749] XFS (loop1): log mount failed [ 816.105421] 00000000b6e3aa1a: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ 12:11:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x6800, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 816.272295] 00000000c616a7af: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 816.281675] 00000000fbc5157f: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 816.290937] XFS (loop5): SB validate failed with error -117. 12:11:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000300000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:11:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:11:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x400000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) 12:11:30 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) [ 816.611822] XFS (loop1): Mounting V4 Filesystem [ 816.653610] XFS (loop5): SB sanity check failed [ 816.658498] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 816.682836] attempt to access beyond end of device [ 816.688351] loop1: rw=4096, want=2036888240641, limit=264192 12:11:30 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r4, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) flistxattr(r2, &(0x7f0000001200)=""/158, 0x9e) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0xfffffffffffffffa, 0x400, 0x2, 0x7}) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/full\x00', 0x202000, 0x0) unshare(0x40000000) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001500)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000001700)=0xe8) fstat(r6, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r5, &(0x7f0000000140)='./file0\x00', r7, r8, 0x1500) flock(r3, 0x0) getpeername$unix(r5, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) dup3(r1, r0, 0x0) [ 816.715009] XFS (loop1): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 816.788105] XFS (loop1): empty log check failed [ 816.808515] XFS (loop5): Unmount and run xfs_repair [ 816.865417] XFS (loop1): log mount/recovery failed: error -5 [ 816.889235] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 816.986820] XFS (loop1): log mount failed [ 817.035828] 00000000da9da19a: 58 46 53 42 00 00 03 00 00 00 00 00 00 00 10 00 XFSB............ [ 817.092702] IPVS: ftp: loaded support on port[0] = 21 [ 817.120300] 00000000aaae1d66: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 12:11:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x12fb2, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 817.251263] 0000000068f0b01f: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 817.290893] XFS (loop0): Invalid superblock magic number 12:11:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:11:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) [ 817.322892] 000000000d784e60: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ 12:11:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3e6, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 817.396069] 00000000db3d22df: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 817.502286] 00000000434ba856: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ 12:11:31 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r4, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) flistxattr(r2, &(0x7f0000001200)=""/158, 0x9e) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0xfffffffffffffffa, 0x400, 0x2, 0x7}) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/full\x00', 0x202000, 0x0) unshare(0x40000000) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001500)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000001700)=0xe8) fstat(r6, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r5, &(0x7f0000000140)='./file0\x00', r7, r8, 0x1500) flock(r3, 0x0) getpeername$unix(r5, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) dup3(r1, r0, 0x0) 12:11:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) [ 817.641564] 00000000d3d8e681: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 817.727222] XFS (loop1): Mounting V4 Filesystem [ 817.739732] 0000000053ce7c93: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 817.789295] attempt to access beyond end of device [ 817.822392] loop1: rw=4096, want=2036888240641, limit=264192 [ 817.840023] XFS (loop5): SB validate failed with error -117. [ 817.872432] XFS (loop1): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 12:11:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000700000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 817.952317] XFS (loop1): empty log check failed [ 817.972284] IPVS: ftp: loaded support on port[0] = 21 [ 817.982118] XFS (loop1): log mount/recovery failed: error -5 [ 818.005231] XFS (loop0): Invalid superblock magic number [ 818.037283] XFS (loop1): log mount failed 12:11:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff00000000]}) 12:11:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2000000000000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 818.231575] XFS (loop5): unknown mount option [/dev/loop0]. 12:11:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x7900, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:11:32 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r4, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) flistxattr(r2, &(0x7f0000001200)=""/158, 0x9e) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0xfffffffffffffffa, 0x400, 0x2, 0x7}) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/full\x00', 0x202000, 0x0) unshare(0x40000000) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001500)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000001700)=0xe8) fstat(r6, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r5, &(0x7f0000000140)='./file0\x00', r7, r8, 0x1500) flock(r3, 0x0) getpeername$unix(r5, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) dup3(r1, r0, 0x0) 12:11:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200c41000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:11:32 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r4, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) flistxattr(r2, &(0x7f0000001200)=""/158, 0x9e) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0xfffffffffffffffa, 0x400, 0x2, 0x7}) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/full\x00', 0x202000, 0x0) unshare(0x40000000) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001500)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000001700)=0xe8) fstat(r6, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r5, &(0x7f0000000140)='./file0\x00', r7, r8, 0x1500) flock(r3, 0x0) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 818.791478] XFS (loop5): SB sanity check failed [ 818.796346] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 12:11:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) [ 818.860754] IPVS: ftp: loaded support on port[0] = 21 [ 818.885348] XFS (loop5): Unmount and run xfs_repair [ 818.928751] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 818.996887] 000000006cbbcccb: 58 46 53 42 00 c4 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 819.057768] IPVS: ftp: loaded support on port[0] = 21 [ 819.096635] 0000000040ce93d4: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 819.250453] 00000000a78b11de: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 12:11:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xff0f, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) 12:11:33 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) 12:11:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0xffff8801d1dc6260, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 819.353031] 00000000b090d159: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 819.403943] 0000000060f851e1: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 819.462465] 000000003ac08dc6: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 819.514531] 000000002bf491a8: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 819.574030] 00000000e613b714: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 819.636590] XFS (loop5): SB validate failed with error -117. 12:11:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200040000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:11:33 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff]}) [ 820.063993] XFS (loop5): SB sanity check failed [ 820.068867] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 820.094916] XFS (loop5): Unmount and run xfs_repair [ 820.120858] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 820.129490] 000000007d20a208: 58 46 53 42 00 04 00 00 00 00 00 00 00 00 10 00 XFSB............ [ 820.152745] 0000000082c8a288: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 820.164347] 00000000f7e17c53: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 820.173358] 000000009e130123: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 820.185715] XFS (loop2): Invalid superblock magic number [ 820.192243] 00000000799617a3: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 12:11:34 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) [ 820.269879] 000000004d5e6aaa: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 820.280095] 0000000039252f4b: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... 12:11:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x600000000000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) 12:11:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0xc5, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 820.316936] 000000004c1c7503: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 820.342424] XFS (loop5): SB validate failed with error -117. [ 820.670701] XFS (loop2): Mounting V4 Filesystem [ 820.717129] attempt to access beyond end of device [ 820.731796] loop2: rw=4096, want=2036888240641, limit=264192 [ 820.759653] XFS (loop2): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 820.814518] XFS (loop2): empty log check failed [ 820.834357] XFS (loop2): log mount/recovery failed: error -5 [ 820.850963] XFS (loop2): log mount failed [ 820.954585] XFS (loop0): Invalid superblock magic number 12:11:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200c41000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:11:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000003100000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:11:35 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r4, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) flistxattr(r2, &(0x7f0000001200)=""/158, 0x9e) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0xfffffffffffffffa, 0x400, 0x2, 0x7}) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/full\x00', 0x202000, 0x0) unshare(0x40000000) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001500)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000001700)=0xe8) fstat(r6, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r5, &(0x7f0000000140)='./file0\x00', r7, r8, 0x1500) flock(r3, 0x0) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) 12:11:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfcfdffff00000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) 12:11:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x5800, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:11:35 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000]}) [ 821.839575] XFS (loop1): SB sanity check failed [ 821.844632] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 821.880201] XFS (loop5): SB sanity check failed [ 821.885112] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 821.945283] XFS (loop1): Unmount and run xfs_repair [ 821.957841] XFS (loop5): Unmount and run xfs_repair [ 821.983416] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 821.997918] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 822.018811] IPVS: ftp: loaded support on port[0] = 21 [ 822.035604] 00000000562bc355: 58 46 53 42 00 c4 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 822.051698] 000000003b503c45: 58 46 53 42 00 00 00 03 10 00 00 00 00 00 10 00 XFSB............ [ 822.127334] 00000000f3248c8c: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 822.148479] 00000000326300a7: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 822.219166] 000000005fb0e717: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 822.235411] 00000000e45343fc: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 822.287704] 0000000006cabc36: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 822.300095] 0000000032cfc470: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 822.338471] 00000000bf82de6d: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 822.351232] 00000000e744bf73: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 822.391738] 00000000e9ef8b87: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 822.404285] 00000000af134ea9: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 822.449237] 00000000bc637de5: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 822.461960] 0000000004ba6b81: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 822.522088] 000000000f21662e: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 822.533584] 000000000e68b398: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 822.543132] XFS (loop5): SB validate failed with error -117. [ 822.618400] XFS (loop0): Invalid superblock magic number [ 822.651546] XFS (loop1): SB validate failed with error -117. 12:11:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x4500, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:11:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="58465342000003870c0000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:11:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xea02000000000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) 12:11:36 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r4, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) flistxattr(r2, &(0x7f0000001200)=""/158, 0x9e) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0xfffffffffffffffa, 0x400, 0x2, 0x7}) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/full\x00', 0x202000, 0x0) unshare(0x40000000) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001500)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000001700)=0xe8) fstat(r6, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r5, &(0x7f0000000140)='./file0\x00', r7, r8, 0x1500) flock(r3, 0x0) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) 12:11:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 12:11:36 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r4, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) flistxattr(r2, &(0x7f0000001200)=""/158, 0x9e) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0xfffffffffffffffa, 0x400, 0x2, 0x7}) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/full\x00', 0x202000, 0x0) unshare(0x40000000) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001500)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000001700)=0xe8) fstat(r6, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r5, &(0x7f0000000140)='./file0\x00', r7, r8, 0x1500) getpeername$unix(r5, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 822.878579] XFS (loop5): unknown mount option [/dev/loop0]. 12:11:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200301000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 823.239259] IPVS: ftp: loaded support on port[0] = 21 [ 823.254294] IPVS: ftp: loaded support on port[0] = 21 [ 823.437970] XFS (loop5): SB sanity check failed [ 823.442885] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 823.574024] XFS (loop5): Unmount and run xfs_repair 12:11:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x7600, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 823.628968] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 823.708345] 000000008224a2c8: 58 46 53 42 00 30 10 00 00 00 00 00 00 00 10 00 XFSB.0.......... 12:11:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 823.842141] 00000000608d72f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 823.914572] 00000000b36a5a60: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 823.943209] 0000000085842ad6: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 823.997633] 0000000018379be4: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 824.047932] 0000000001f284e0: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 824.096292] 0000000010497151: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 824.139128] 000000003f9a8c9b: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 12:11:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) [ 824.184695] XFS (loop5): SB validate failed with error -117. 12:11:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="58465342000003891c0000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 824.573987] XFS (loop5): SB sanity check failed [ 824.578853] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 824.591493] XFS (loop5): Unmount and run xfs_repair [ 824.596684] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 824.608525] XFS (loop2): Invalid superblock magic number [ 824.644020] 00000000cd83ad18: 58 46 53 42 00 00 03 89 1c 00 00 00 00 00 10 00 XFSB............ [ 824.654076] 00000000ed123999: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 824.660665] XFS (loop0): Invalid superblock magic number [ 824.663336] 0000000044dc335a: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 824.679840] 00000000b1ed6bcd: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ 12:11:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x3300, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 824.689860] 00000000092ae2f1: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 824.699527] 000000004d93e220: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 824.710090] 00000000a7543235: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 824.719548] 0000000078ce2a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 824.729993] XFS (loop5): SB validate failed with error -117. 12:11:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 12:11:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8003, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 824.892895] XFS (loop5): unknown mount option [/dev/loop0]. 12:11:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000389280000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 825.351059] XFS (loop5): SB sanity check failed [ 825.355923] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 825.441361] XFS (loop5): Unmount and run xfs_repair [ 825.462726] XFS (loop2): Invalid superblock magic number [ 825.483181] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 825.544285] 0000000054277805: 58 46 53 42 00 00 03 89 28 00 00 00 00 00 10 00 XFSB....(....... [ 825.597108] 00000000dd6b8407: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 825.633343] 00000000daa092f9: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 825.657641] 00000000def36928: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 825.668775] 000000002d41c9ba: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 825.679320] 0000000024ecaf4a: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 825.697584] 000000008b43598d: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 825.732135] 000000006bb52db3: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 825.761361] XFS (loop5): SB validate failed with error -117. [ 825.922335] XFS (loop5): unknown mount option [/dev/loop0]. 12:11:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="58465342000003891c0000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:11:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000]}) 12:11:40 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r4, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) flistxattr(r2, &(0x7f0000001200)=""/158, 0x9e) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0xfffffffffffffffa, 0x400, 0x2, 0x7}) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/full\x00', 0x202000, 0x0) unshare(0x40000000) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001500)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000001700)=0xe8) fstat(r6, &(0x7f0000001800)) getpeername$unix(r5, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) 12:11:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x8200, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:11:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1fffff, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) 12:11:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200003f00000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 826.675258] XFS (loop1): SB sanity check failed [ 826.681418] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 12:11:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) [ 826.811075] XFS (loop1): Unmount and run xfs_repair [ 826.854816] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 826.863211] XFS (loop5): SB sanity check failed [ 826.867926] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 826.891169] IPVS: ftp: loaded support on port[0] = 21 [ 826.952895] 00000000c2c66b4f: 58 46 53 42 00 00 03 89 1c 00 00 00 00 00 10 00 XFSB............ [ 826.995944] XFS (loop5): Unmount and run xfs_repair [ 827.046768] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 827.057086] 0000000031e3f0ba: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 827.113530] 0000000074c118c9: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 827.125644] 000000009e520d92: 58 46 53 42 00 00 3f 00 00 00 00 00 00 00 10 00 XFSB..?......... [ 827.181453] 000000007dff820b: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 827.200879] 00000000d74e450f: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 827.240665] 0000000098d1d128: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 827.253063] 000000006e7243b3: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 827.297540] 00000000ff70a2ac: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 827.335815] 00000000ac207459: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 827.348661] 00000000133da94d: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 827.443401] 00000000ce20ba53: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 827.454205] 0000000005eb1247: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 827.457297] 000000003a97b6a8: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 827.472403] 00000000845dfcf4: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 827.482171] 0000000013d69462: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 12:11:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0xffff8801c3a0ee38, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 827.491491] XFS (loop5): SB validate failed with error -117. [ 827.499098] XFS (loop1): SB validate failed with error -117. 12:11:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2000000000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) 12:11:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000500000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:11:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff00000000]}) 12:11:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xc4, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) [ 827.911175] XFS (loop5): SB sanity check failed [ 827.916022] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 828.000337] XFS (loop5): Unmount and run xfs_repair [ 828.024012] XFS (loop1): Invalid superblock magic number [ 828.037121] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 828.092967] 00000000b2e32737: 58 46 53 42 00 00 05 00 00 00 00 00 00 00 10 00 XFSB............ 12:11:42 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r4, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) flistxattr(r2, &(0x7f0000001200)=""/158, 0x9e) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0xfffffffffffffffa, 0x400, 0x2, 0x7}) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/full\x00', 0x202000, 0x0) unshare(0x40000000) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001500)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000001700)=0xe8) fstat(r6, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r5, &(0x7f0000000140)='./file0\x00', r7, r8, 0x1500) flock(r3, 0x0) getpeername$unix(r5, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000001340)={0x4, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x14}}, {0x2, 0x4e22, @rand_addr}, {0x2, 0x4e21, @multicast1}, 0x4, 0x1, 0x0, 0x80000001, 0x6, &(0x7f0000001300)='eql\x00', 0x1, 0x101, 0x91f3}) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 828.167630] 0000000070d2f0a5: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 828.228214] 0000000049a409b0: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 828.282077] 0000000059710deb: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ 12:11:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) [ 828.340024] 00000000d7fb6301: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 828.446604] 000000001c87ceef: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 828.490473] 00000000176e9a11: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 828.500329] 000000003b943bf8: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 828.509625] XFS (loop5): SB validate failed with error -117. [ 828.571758] IPVS: ftp: loaded support on port[0] = 21 12:11:43 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r4, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) flistxattr(r2, &(0x7f0000001200)=""/158, 0x9e) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0xfffffffffffffffa, 0x400, 0x2, 0x7}) openat$full(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/full\x00', 0x202000, 0x0) unshare(0x40000000) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001500)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000001700)=0xe8) getpeername$unix(r5, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) 12:11:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0xc400, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:11:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000b00000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:11:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2c00000000000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) 12:11:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 12:11:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 829.558779] XFS (loop5): SB sanity check failed [ 829.564096] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 829.602251] XFS (loop1): SB sanity check failed [ 829.607083] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 829.629307] IPVS: ftp: loaded support on port[0] = 21 [ 829.663951] XFS (loop5): Unmount and run xfs_repair [ 829.697997] XFS (loop1): Unmount and run xfs_repair [ 829.708821] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 829.745478] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 829.768440] 0000000063fd8575: 58 46 53 42 00 00 0b 00 00 00 00 00 00 00 10 00 XFSB............ [ 829.800837] 00000000d9adb56b: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 829.829702] 00000000123ce1d9: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 829.839302] 000000008ba9e6b9: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 829.849130] 00000000b0dff782: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 829.859443] 00000000e87aba67: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 829.869000] 00000000da26faf2: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 829.878495] 0000000016f02387: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 829.888072] 000000004d3f8c60: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 829.897523] 000000007a1cb4b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 829.907164] XFS (loop1): SB validate failed with error -117. [ 829.918805] 00000000e65297eb: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 829.962626] 00000000eb2004a6: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 830.004577] 0000000003cf7750: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 830.021293] 00000000e6032f69: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ 12:11:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x48, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) 12:11:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) [ 830.052576] 000000003b7abfa0: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 830.068059] 0000000050945e5f: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 830.078174] XFS (loop5): SB validate failed with error -117. 12:11:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200101000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:11:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x12faa, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:11:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x700, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) 12:11:44 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r4, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) flistxattr(r2, &(0x7f0000001200)=""/158, 0x9e) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0xfffffffffffffffa, 0x400, 0x2, 0x7}) openat$full(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/full\x00', 0x202000, 0x0) unshare(0x40000000) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001500)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000001700)=0xe8) getpeername$unix(r5, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 830.492519] XFS (loop1): Invalid superblock magic number 12:11:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 830.627571] XFS (loop5): SB sanity check failed [ 830.633701] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 12:11:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff]}) [ 830.770631] XFS (loop5): Unmount and run xfs_repair [ 830.808730] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 830.842399] IPVS: ftp: loaded support on port[0] = 21 [ 830.867553] XFS (loop1): unknown mount option [/dev/loop0]. [ 830.869268] 00000000d9b29ef1: 58 46 53 42 00 10 10 00 00 00 00 00 00 00 10 00 XFSB............ 12:11:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 831.056136] 0000000066624451: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 831.170912] 0000000068c040cf: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 831.179986] 000000007375ddc8: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 831.197955] 000000008b5d8952: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 12:11:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x12fb0, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 831.253767] 00000000fb20f2fa: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 831.263176] XFS (loop0): Invalid superblock magic number [ 831.268942] 0000000057780454: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 831.278474] 00000000e991313b: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 831.288552] XFS (loop5): SB validate failed with error -117. 12:11:45 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 12:11:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000d00000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:11:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6000000000000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 831.479475] XFS (loop1): Mounting V4 Filesystem 12:11:45 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r4, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) flistxattr(r2, &(0x7f0000001200)=""/158, 0x9e) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0xfffffffffffffffa, 0x400, 0x2, 0x7}) openat$full(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/full\x00', 0x202000, 0x0) unshare(0x40000000) dup2(0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r5, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 831.536751] attempt to access beyond end of device [ 831.586497] loop1: rw=4096, want=2036888240641, limit=264192 [ 831.642492] XFS (loop1): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 831.740673] XFS (loop1): empty log check failed [ 831.754278] XFS (loop5): SB sanity check failed [ 831.759141] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 831.803524] XFS (loop1): log mount/recovery failed: error -5 [ 831.859346] XFS (loop5): Unmount and run xfs_repair [ 831.869969] XFS (loop1): log mount failed [ 831.902061] IPVS: ftp: loaded support on port[0] = 21 [ 831.909795] XFS (loop5): First 128 bytes of corrupted metadata buffer: 12:11:46 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) [ 832.034774] 00000000070dc2f6: 58 46 53 42 00 00 0d 00 00 00 00 00 00 00 10 00 XFSB............ 12:11:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 832.140258] 00000000d3592674: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 832.149438] 00000000aa3fbd87: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 832.165896] 000000003ea2a9ec: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 832.177641] 000000004904ccb4: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 832.186984] 00000000bb513506: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ 12:11:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x4200, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 832.291859] 0000000089abc70a: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... 12:11:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x72020000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 832.398823] 000000005c0fdc55: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 12:11:46 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r4, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) flistxattr(r2, &(0x7f0000001200)=""/158, 0x9e) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0xfffffffffffffffa, 0x400, 0x2, 0x7}) openat$full(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/full\x00', 0x202000, 0x0) unshare(0x40000000) getpeername$unix(r5, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 832.501265] XFS (loop5): SB validate failed with error -117. 12:11:46 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff00000000]}) [ 832.585968] XFS (loop1): Mounting V4 Filesystem [ 832.656369] attempt to access beyond end of device 12:11:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="58465342000e1000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 832.696816] loop1: rw=4096, want=2036888240641, limit=264192 [ 832.754927] XFS (loop1): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 832.857240] XFS (loop5): unknown mount option [/dev/loop0]. [ 832.860416] IPVS: ftp: loaded support on port[0] = 21 [ 832.869153] XFS (loop1): empty log check failed [ 832.908595] XFS (loop1): log mount/recovery failed: error -5 [ 832.968824] XFS (loop1): log mount failed [ 833.012569] XFS (loop5): unknown mount option [/dev/loop0]. 12:11:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200080000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:11:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 12:11:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:11:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x6000, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:11:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1f000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 833.548723] XFS (loop1): Mounting V4 Filesystem [ 833.559720] XFS (loop5): SB sanity check failed [ 833.564800] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 833.624351] attempt to access beyond end of device [ 833.645390] XFS (loop5): Unmount and run xfs_repair [ 833.650826] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 833.657736] 00000000a98888e3: 58 46 53 42 00 08 00 00 00 00 00 00 00 00 10 00 XFSB............ [ 833.666975] 00000000d4ed4607: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 833.672941] loop1: rw=4096, want=2036888240641, limit=264192 [ 833.676159] 000000003073ca2e: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 833.683345] XFS (loop1): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 833.702707] XFS (loop1): empty log check failed [ 833.708328] XFS (loop1): log mount/recovery failed: error -5 [ 833.724703] 00000000273c271e: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 833.734372] XFS (loop1): log mount failed [ 833.749478] 000000005f51e553: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 833.762994] 000000004b43af51: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 833.773201] 0000000022ca56ab: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 833.783762] 000000009ae46566: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 833.795122] XFS (loop5): SB validate failed with error -117. 12:11:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 833.945153] XFS (loop5): unknown mount option [/dev/loop0]. 12:11:48 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) 12:11:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000374400000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:11:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="ed46534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 834.357283] XFS (loop1): Mounting V4 Filesystem [ 834.387915] attempt to access beyond end of device [ 834.408298] loop1: rw=4096, want=2036888240641, limit=264192 [ 834.441292] XFS (loop1): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 834.456451] XFS (loop5): SB sanity check failed [ 834.461973] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 834.511886] XFS (loop1): empty log check failed [ 834.520886] XFS (loop5): Unmount and run xfs_repair [ 834.536963] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 834.540831] XFS (loop1): log mount/recovery failed: error -5 [ 834.566118] 00000000e7174437: 58 46 53 42 00 00 03 74 40 00 00 00 00 00 10 00 XFSB...t@....... [ 834.594040] XFS (loop1): log mount failed [ 834.611068] 00000000172f8a4e: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 834.622564] 00000000c95bc0f0: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 834.633752] 000000007a9a1ff5: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 834.647526] 000000008bd240f8: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 834.656678] 00000000c111ac6b: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 834.668599] XFS (loop2): Invalid superblock magic number [ 834.674792] 000000004257bc7b: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 834.690988] 000000005f3d88c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 834.700588] XFS (loop5): SB validate failed with error -117. 12:11:49 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r4, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) flistxattr(r2, &(0x7f0000001200)=""/158, 0x9e) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0xfffffffffffffffa, 0x400, 0x2, 0x7}) openat$full(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/full\x00', 0x202000, 0x0) getpeername$unix(r5, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) 12:11:49 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 12:11:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7002, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) 12:11:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="58ed534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:11:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="584653420000d600000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:11:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 835.482844] XFS (loop1): unknown mount option [/dev/loop0]. 12:11:49 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r4, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) flistxattr(r2, &(0x7f0000001200)=""/158, 0x9e) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0xfffffffffffffffa, 0x400, 0x2, 0x7}) openat$full(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/full\x00', 0x202000, 0x0) unshare(0x40000000) getpeername$unix(r5, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 835.548723] XFS (loop2): Invalid superblock magic number 12:11:49 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r4, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) flistxattr(r2, &(0x7f0000001200)=""/158, 0x9e) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0xfffffffffffffffa, 0x400, 0x2, 0x7}) getpeername$unix(r5, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 835.638731] XFS (loop5): SB sanity check failed [ 835.722834] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 835.765259] IPVS: ftp: loaded support on port[0] = 21 12:11:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846ed4200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:11:49 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) [ 835.847944] XFS (loop5): Unmount and run xfs_repair [ 835.885007] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 835.892192] 000000009884188c: 58 46 53 42 00 00 d6 00 00 00 00 00 00 00 10 00 XFSB............ [ 835.901281] 0000000081d37b82: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 835.910290] 000000006ff83b4d: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 835.920467] 00000000311e7cf3: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 835.929417] 00000000172199cf: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 12:11:50 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r4, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) flistxattr(r2, &(0x7f0000001200)=""/158, 0x9e) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r5, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 836.029503] 00000000f29c8ebf: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 836.055193] 000000000c7ecfff: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 836.084315] 0000000038018e34: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 836.111309] XFS (loop2): Invalid superblock magic number [ 836.125492] XFS (loop5): SB validate failed with error -117. [ 836.147387] XFS (loop0): Invalid superblock magic number 12:11:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="584653ed00001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:11:50 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r4, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) flistxattr(r2, &(0x7f0000001200)=""/158, 0x9e) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0xfffffffffffffffa, 0x400, 0x2, 0x7}) getpeername$unix(r5, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 836.260361] XFS (loop5): unknown mount option [/dev/loop0]. 12:11:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3f000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) 12:11:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200481000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:11:50 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r4, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) flistxattr(r2, &(0x7f0000001200)=""/158, 0x9e) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r5, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) 12:11:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) [ 836.545788] XFS (loop2): Invalid superblock magic number 12:11:50 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r4, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) flistxattr(r2, &(0x7f0000001200)=""/158, 0x9e) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0xfffffffffffffffa, 0x400, 0x2, 0x7}) openat$full(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/full\x00', 0x202000, 0x0) getpeername$unix(r5, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 836.664400] XFS (loop5): SB sanity check failed [ 836.669373] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 12:11:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200201000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:11:50 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r4, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) flistxattr(r2, &(0x7f0000001200)=""/158, 0x9e) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r5, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 836.860860] XFS (loop5): Unmount and run xfs_repair [ 836.866101] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 836.873100] 000000003faf5053: 58 46 53 42 00 48 10 00 00 00 00 00 00 00 10 00 XFSB.H.......... [ 836.882397] 000000000b27d436: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 836.896813] 000000003658e667: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 12:11:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000]}) [ 836.939567] 00000000ceb4023b: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 836.948912] 00000000a14b39af: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 836.977350] 0000000066334948: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 837.008363] 0000000040f7d093: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 837.026197] 00000000d64e975e: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 837.038440] XFS (loop2): SB sanity check failed [ 837.045562] XFS (loop0): Invalid superblock magic number [ 837.059737] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 837.080991] XFS (loop5): SB validate failed with error -117. [ 837.090667] XFS (loop2): Unmount and run xfs_repair [ 837.095833] XFS (loop2): First 128 bytes of corrupted metadata buffer: 12:11:51 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r4, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) flistxattr(r2, &(0x7f0000001200)=""/158, 0x9e) getpeername$unix(0xffffffffffffffff, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) 12:11:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3b6, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) 12:11:51 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r4, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) flistxattr(r2, &(0x7f0000001200)=""/158, 0x9e) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r5, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 837.193157] 000000007af95b74: 58 46 53 42 00 20 10 00 00 00 00 00 00 00 10 00 XFSB. .......... 12:11:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000378400000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:11:51 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff]}) [ 837.291716] 000000000648676d: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 837.306343] 00000000f5e7fca1: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 837.345335] 0000000034ca3559: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 837.366246] 00000000856c4d44: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 837.385666] 0000000008877881: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 837.408632] 0000000046c93086: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 837.439892] 00000000088d0b25: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 837.461944] XFS (loop2): SB validate failed with error -117. [ 837.485854] XFS (loop5): SB sanity check failed [ 837.491935] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 12:11:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="584653ed00001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:11:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="58465342507e0300000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 837.626344] XFS (loop5): Unmount and run xfs_repair [ 837.654369] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 837.692658] 000000007af95b74: 58 46 53 42 00 00 03 78 40 00 00 00 00 00 10 00 XFSB...x@....... 12:11:51 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) [ 837.721978] XFS (loop0): Invalid superblock magic number [ 837.723057] 000000000648676d: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 837.786747] 00000000f5e7fca1: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 837.798743] XFS (loop1): Invalid superblock magic number [ 837.842004] 0000000034ca3559: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 837.847240] XFS (loop2): SB sanity check failed [ 837.861887] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 12:11:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffff8c, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 837.919533] XFS (loop2): Unmount and run xfs_repair [ 837.935816] 00000000856c4d44: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 837.945797] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 837.966690] 00000000dcac472f: 58 46 53 42 50 7e 03 00 00 00 00 00 00 00 10 00 XFSBP~.......... 12:11:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 838.025452] 0000000002ed564d: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 12:11:52 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r4, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) flistxattr(r2, &(0x7f0000001200)=""/158, 0x9e) getpeername$unix(0xffffffffffffffff, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 838.067627] 000000001d31340c: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 838.074002] 0000000008877881: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 838.172750] 0000000046c93086: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 838.185620] 000000005551fe49: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 838.224172] 00000000088d0b25: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 838.254066] 00000000ebb80f4f: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 12:11:52 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r4, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) flistxattr(r2, &(0x7f0000001200)=""/158, 0x9e) getpeername$unix(0xffffffffffffffff, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) 12:11:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) [ 838.270731] XFS (loop5): SB validate failed with error -117. [ 838.292350] 000000009ceb590d: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 838.325758] XFS (loop1): Invalid superblock magic number 12:11:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="584653420000037c400000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 838.380476] 0000000025a821a0: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 838.416909] 00000000b6bdcb9a: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ 12:11:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 838.498811] XFS (loop2): SB validate failed with error -117. 12:11:52 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r4, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r5, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) 12:11:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="584653420003ffff000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:11:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) [ 838.720016] XFS (loop5): SB sanity check failed [ 838.727093] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 12:11:52 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r3, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r4, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 838.824243] XFS (loop1): Mounting V4 Filesystem [ 838.868989] XFS (loop5): Unmount and run xfs_repair [ 838.878874] attempt to access beyond end of device [ 838.903115] loop1: rw=4096, want=2036888240641, limit=264192 12:11:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6800000000000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 838.916933] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 838.938630] XFS (loop1): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 838.952527] 0000000080d0dabb: 58 46 53 42 00 00 03 7c 40 00 00 00 00 00 10 00 XFSB...|@....... [ 838.953165] XFS (loop2): SB sanity check failed [ 838.980049] XFS (loop1): empty log check failed [ 838.990381] 00000000f7b6ab32: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 838.998684] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 839.011166] XFS (loop1): log mount/recovery failed: error -5 [ 839.027341] 00000000630ada1e: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 839.039302] XFS (loop1): log mount failed [ 839.062710] XFS (loop2): Unmount and run xfs_repair 12:11:53 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r3, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r4, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 839.080101] 00000000843903f6: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 839.119993] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 839.164488] 00000000470beaa1: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 839.183585] 000000009200df72: 58 46 53 42 00 03 ff ff 00 00 00 00 00 00 10 00 XFSB............ [ 839.212362] 000000000edbb8e8: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ 12:11:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 839.259348] 0000000081ebefce: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 839.260642] 000000008fc5efc8: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 839.296316] 00000000f6839198: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 12:11:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff00000000]}) [ 839.373608] XFS (loop5): SB validate failed with error -117. [ 839.378738] 00000000efaaca66: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 12:11:53 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r3, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r4, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) 12:11:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000389200000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 839.509977] 0000000051159311: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 839.606869] 00000000218a6160: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 839.617137] XFS (loop1): Mounting V4 Filesystem [ 839.651784] attempt to access beyond end of device [ 839.662751] loop1: rw=4096, want=2036888240641, limit=264192 [ 839.677571] XFS (loop1): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 839.687608] XFS (loop1): empty log check failed [ 839.692824] XFS (loop1): log mount/recovery failed: error -5 [ 839.695894] 000000005f4c0472: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 839.722842] XFS (loop1): log mount failed [ 839.756070] 00000000bfcbfe69: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 839.771129] XFS (loop5): unknown mount option [/dev/loop0]. 12:11:53 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r5, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 839.797931] 0000000087d445b7: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 839.807048] XFS (loop2): SB validate failed with error -117. 12:11:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000380400000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:11:53 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r3, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r4, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) 12:11:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000200000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:11:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xff0f0000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) 12:11:54 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff]}) 12:11:54 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r5, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) 12:11:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffff8c, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 840.170002] XFS (loop2): SB sanity check failed [ 840.176091] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 840.199910] XFS (loop5): SB sanity check failed [ 840.205635] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 840.249528] XFS (loop2): Unmount and run xfs_repair [ 840.278036] XFS (loop5): Unmount and run xfs_repair [ 840.311271] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 840.322844] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 840.395208] 00000000ff83fa67: 58 46 53 42 00 00 02 00 00 00 00 00 00 00 10 00 XFSB............ [ 840.410426] 000000009c7418eb: 58 46 53 42 00 00 03 80 40 00 00 00 00 00 10 00 XFSB....@....... 12:11:54 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r5, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 840.539211] 000000005adfb13e: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 840.541738] 00000000d82a7694: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 840.557695] 000000009330a9b4: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 840.567074] 00000000d7669d3a: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 840.577339] 000000004e9f4ace: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 840.586781] 00000000f7d4efa4: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 840.622838] 00000000b0740a46: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 840.638053] 00000000871cb2e3: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 840.647621] XFS (loop5): SB validate failed with error -117. [ 840.656426] 00000000af310714: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 840.679868] 00000000bd1249ce: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 840.690743] 00000000d9da53a6: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 840.699766] 00000000a5966aed: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 840.709752] 000000000beeea0a: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 840.719042] 00000000ac28044f: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ 12:11:54 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) [ 840.788464] XFS (loop0): Invalid superblock magic number [ 840.794591] XFS (loop2): SB validate failed with error -117. 12:11:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200100000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:11:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="584653420e001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:11:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4253465800000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 841.164530] XFS (loop5): SB sanity check failed [ 841.169355] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 841.192628] XFS (loop2): SB sanity check failed 12:11:55 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a131266462fed8d349d0df05b112c1f5e95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7de666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9000000000000000000000000000000"], 0x92) getsockopt$inet6_buf(r4, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) flistxattr(r2, &(0x7f0000001200)=""/158, 0x9e) getpeername$unix(0xffffffffffffffff, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 841.207452] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 841.250837] XFS (loop2): Unmount and run xfs_repair [ 841.251825] XFS (loop5): Unmount and run xfs_repair [ 841.291379] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 841.312736] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 841.316605] 00000000a2319348: 58 46 53 42 0e 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 12:11:55 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r5, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) 12:11:55 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) [ 841.358264] 00000000bccb3f02: 58 46 53 42 00 10 00 00 00 00 00 00 00 00 10 00 XFSB............ [ 841.425848] 0000000092b25250: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 841.434672] 000000006fd56938: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 841.481385] 000000001a562676: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 841.498991] 000000003fb2d75a: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 12:11:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 841.525864] 00000000a9680d8b: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 841.569781] 000000007245cd19: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 841.576448] 0000000095c9b7c9: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 12:11:55 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r4, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 841.663475] 00000000b1b32b31: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 841.687286] 0000000047198a29: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 841.720353] 0000000061f8df84: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 841.729819] 00000000ff734bab: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 841.740190] XFS (loop5): SB validate failed with error -117. [ 841.753303] 00000000adff32b3: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ 12:11:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200307b69f9a37f000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 841.803491] XFS (loop0): Invalid superblock magic number [ 841.816407] 0000000008a18878: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 841.849888] XFS (loop1): Mounting V4 Filesystem 12:11:55 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) [ 841.924037] attempt to access beyond end of device 12:11:55 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r4, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 841.960205] 00000000292b7132: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 841.972734] loop1: rw=4096, want=2036888240641, limit=264192 12:11:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6c000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 842.008499] XFS (loop5): unknown mount option [/dev/loop0]. [ 842.015172] XFS (loop1): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 842.015472] XFS (loop1): empty log check failed [ 842.015592] XFS (loop1): log mount/recovery failed: error -5 [ 842.024855] XFS (loop2): SB validate failed with error -117. [ 842.073771] XFS (loop1): log mount failed 12:11:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="584653422c001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:11:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) [ 842.221609] XFS (loop5): unknown mount option [/dev/loop0]. 12:11:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000389300000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:11:56 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r4, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) 12:11:56 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0fff027400f8000000000283224ea4224b5494fab2", 0x25}], 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 12:11:56 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000]}) [ 842.460821] XFS (loop2): SB sanity check failed [ 842.469636] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 842.533084] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 842.556837] XFS (loop2): Unmount and run xfs_repair 12:11:56 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r3, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r4, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 842.581191] FAT-fs (loop1): bogus number of directory entries (767) [ 842.591249] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 842.604032] XFS (loop5): SB sanity check failed [ 842.608901] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 842.671411] FAT-fs (loop1): Can't find a valid FAT filesystem [ 842.682139] 000000000894ab07: 58 46 53 42 2c 00 10 00 00 00 00 00 00 00 10 00 XFSB,........... [ 842.699289] XFS (loop5): Unmount and run xfs_repair [ 842.711828] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 842.748594] 000000000bdf3b79: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 842.767089] 00000000ccd22007: 58 46 53 42 00 00 03 89 30 00 00 00 00 00 10 00 XFSB....0....... [ 842.822599] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 842.831741] 000000000d4274b3: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 842.849204] 00000000a34be555: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 12:11:56 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) pwritev(0xffffffffffffffff, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 842.875080] FAT-fs (loop1): bogus number of directory entries (767) [ 842.924310] 000000004dc5a402: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 842.936249] 000000008673f2f6: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 842.945701] 00000000b8fccccd: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 842.955074] 00000000b9da13ac: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 842.964257] FAT-fs (loop1): Can't find a valid FAT filesystem [ 842.964496] 00000000a94413e3: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 842.979861] 00000000d6925350: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 842.990726] XFS (loop2): SB validate failed with error -117. [ 843.003855] 0000000053efcf00: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ 12:11:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5200, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) 12:11:57 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 12:11:57 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0fff027400f8000000000283224ea4224b5494fab2", 0x25}], 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 843.018197] 0000000033449515: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 843.032022] 000000000eed9689: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 843.049303] 000000008822eac7: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 843.106577] 00000000ac7194be: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 12:11:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200401000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:11:57 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) pwritev(0xffffffffffffffff, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 843.157885] XFS (loop5): SB validate failed with error -117. [ 843.196226] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 843.273029] FAT-fs (loop1): bogus number of directory entries (767) 12:11:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000382400000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 843.316196] FAT-fs (loop1): Can't find a valid FAT filesystem 12:11:57 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) r2 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r2, &(0x7f00000011c0)="f1000000", 0x4) pwritev(0xffffffffffffffff, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 843.438122] XFS (loop2): SB sanity check failed [ 843.444708] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 12:11:57 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0fff027400f8000000000283224ea4224b5494fab2", 0x25}], 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 843.558480] XFS (loop2): Unmount and run xfs_repair [ 843.594952] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 843.637148] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 843.664047] 00000000820fc775: 58 46 53 42 00 40 10 00 00 00 00 00 00 00 10 00 XFSB.@.......... [ 843.676941] XFS (loop5): SB sanity check failed 12:11:57 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) [ 843.689483] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 843.742850] FAT-fs (loop1): bogus number of directory entries (767) 12:11:57 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 843.784234] 000000003c370819: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 843.806644] FAT-fs (loop1): Can't find a valid FAT filesystem [ 843.821129] XFS (loop5): Unmount and run xfs_repair [ 843.848142] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 843.864724] 0000000031afb943: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 12:11:57 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0fff027400f8000000000283224ea4224b5494fab2", 0x25}], 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 843.924515] 00000000453ae6ea: 58 46 53 42 00 00 03 82 40 00 00 00 00 00 10 00 XFSB....@....... [ 843.941486] 00000000b2b08ca5: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ 12:11:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x900, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 843.994408] 00000000539bd7d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 844.012895] 00000000ff0e95c5: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 844.022001] 000000009639f2d1: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 844.041003] 00000000689c1ac7: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 844.073812] 00000000e8ed14e7: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 844.106479] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 12:11:58 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 844.118938] 00000000f4001352: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 844.127059] 00000000f6d0d5cd: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 844.166489] FAT-fs (loop1): bogus number of directory entries (767) [ 844.176198] 000000000d5c6d44: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 844.185523] XFS (loop2): SB validate failed with error -117. 12:11:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) [ 844.207175] 0000000090cdd49d: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 844.222409] FAT-fs (loop1): Can't find a valid FAT filesystem [ 844.225590] 000000008fe08af3: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... 12:11:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200151000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:11:58 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 844.326345] 00000000479b1cc5: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 12:11:58 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0fff027400f8000000000283224ea4224b5494fab2", 0x25}], 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) [ 844.413873] XFS (loop5): SB validate failed with error -117. [ 844.553463] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 844.586481] FAT-fs (loop1): bogus number of directory entries (767) 12:11:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="58465342000f1000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 844.606734] XFS (loop2): SB sanity check failed [ 844.611951] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 844.637621] FAT-fs (loop1): Can't find a valid FAT filesystem 12:11:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) [ 844.675009] XFS (loop2): Unmount and run xfs_repair [ 844.694797] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 844.703285] XFS (loop0): Invalid superblock magic number [ 844.708976] 000000008deef4fa: 58 46 53 42 00 15 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 844.755453] 000000005fa0c5c9: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 12:11:58 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0fff027400f8000000000283224ea4224b5494fab2", 0x25}], 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) [ 844.814940] 000000007ca8b95d: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 844.866344] 00000000edfd59dd: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 844.900711] XFS (loop5): SB sanity check failed [ 844.905583] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 12:11:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 844.913415] 000000001756d6da: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 844.929859] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 844.963653] FAT-fs (loop1): bogus number of directory entries (767) [ 844.975160] XFS (loop5): Unmount and run xfs_repair [ 844.997145] 00000000c16c9c67: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 845.004097] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 845.007740] FAT-fs (loop1): Can't find a valid FAT filesystem [ 845.032297] 00000000acc9aa28: 58 46 53 42 00 0f 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 845.043393] 00000000bea5bbd2: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 845.057529] 00000000678f584e: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 845.067344] 000000005e2207f2: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 845.079294] 000000006c98fd51: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 845.084805] 000000006d820d40: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 845.098612] 0000000087251019: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 12:11:59 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0fff027400f8000000000283224ea4224b5494fab2", 0x25}], 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) [ 845.109239] 0000000062ec2daf: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 845.113155] XFS (loop2): SB validate failed with error -117. [ 845.118767] 000000008d294521: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 845.133018] 0000000093f58082: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 845.142178] XFS (loop5): SB validate failed with error -117. 12:11:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534215001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:11:59 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) write(0xffffffffffffffff, &(0x7f00000011c0)="f1000000", 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) 12:11:59 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) [ 845.276979] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 845.292359] XFS (loop0): Invalid superblock magic number 12:11:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="584653420000037fcc0000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 845.372613] FAT-fs (loop1): bogus number of directory entries (767) [ 845.390677] FAT-fs (loop1): Can't find a valid FAT filesystem 12:11:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x22, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) 12:11:59 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) write(0xffffffffffffffff, &(0x7f00000011c0)="f1000000", 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) 12:11:59 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0fff027400f8000000000283224ea4224b5494fab2", 0x25}], 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 845.505445] XFS (loop2): SB sanity check failed [ 845.530978] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 845.572553] XFS (loop2): Unmount and run xfs_repair [ 845.582305] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 845.618396] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 845.630866] FAT-fs (loop1): bogus number of directory entries (767) [ 845.634615] 00000000285e3c57: 58 46 53 42 15 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 845.651242] XFS (loop5): SB sanity check failed [ 845.655584] 00000000661de14e: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 12:11:59 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) [ 845.656092] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 845.669385] 00000000f9c5f978: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 845.700596] FAT-fs (loop1): Can't find a valid FAT filesystem [ 845.708507] 0000000069790c36: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ 12:11:59 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0fff027400f8000000000283224ea4224b5494fab2", 0x25}], 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 845.746586] XFS (loop5): Unmount and run xfs_repair [ 845.755018] 00000000b36e79a6: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 845.774714] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 845.793222] 00000000ae108016: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 845.797171] 00000000e761fa7b: 58 46 53 42 00 00 03 7f cc 00 00 00 00 00 10 00 XFSB............ [ 845.809302] 000000000e62105f: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 845.821198] 000000000227902b: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 845.830822] XFS (loop2): SB validate failed with error -117. [ 845.851801] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 845.864775] 00000000190b718c: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 845.878117] 000000006f9045f3: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 845.887625] FAT-fs (loop1): bogus number of directory entries (767) [ 845.887989] 0000000030a10391: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 845.903417] 00000000475ed603: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 845.912685] 00000000c31ee44c: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 845.929280] FAT-fs (loop1): Can't find a valid FAT filesystem [ 845.939577] 00000000ecc49a5d: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 845.948832] 00000000c26d8038: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 845.958472] XFS (loop5): SB validate failed with error -117. [ 845.964864] XFS (loop0): Invalid superblock magic number 12:12:00 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) write(0xffffffffffffffff, &(0x7f00000011c0)="f1000000", 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) 12:12:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="584653420c001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:12:00 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 12:12:00 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0fff027400f8000000000283224ea4224b5494fab2", 0x25}], 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:12:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000a00000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:12:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6c, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 846.171863] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 12:12:00 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0)="f1000000", 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 846.239198] FAT-fs (loop1): bogus number of directory entries (767) [ 846.274253] FAT-fs (loop1): Can't find a valid FAT filesystem [ 846.322289] XFS (loop2): SB sanity check failed [ 846.328629] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 846.382761] XFS (loop0): Invalid superblock magic number [ 846.394993] XFS (loop2): Unmount and run xfs_repair [ 846.408056] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 846.419607] 000000006cd10667: 58 46 53 42 0c 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 846.428792] 00000000c1cc2c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 846.438033] 00000000e803575f: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 846.447246] 00000000b6aa2ebf: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 846.456235] 00000000c9691d85: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 846.465322] 00000000043a257a: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 846.465333] 000000006e77a369: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 846.465344] 0000000053eb1c07: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 846.465551] XFS (loop2): SB validate failed with error -117. [ 846.469769] XFS (loop5): SB sanity check failed 12:12:00 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0fff027400f8000000000283224ea4224b5494fab2", 0x25}], 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 12:12:00 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0)="f1000000", 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) 12:12:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534206001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:12:00 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff00000000]}) 12:12:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xedc000000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 846.652614] FAT-fs (loop1): bogus number of reserved sectors [ 846.660626] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 846.683627] FAT-fs (loop1): Can't find a valid FAT filesystem [ 846.705022] XFS (loop5): Unmount and run xfs_repair [ 846.714287] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 846.760452] 0000000021670c9d: 58 46 53 42 00 00 0a 00 00 00 00 00 00 00 10 00 XFSB............ 12:12:00 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0fff027400f8000000000283224ea4224b5494fab2", 0x25}], 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 12:12:00 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) write(0xffffffffffffffff, &(0x7f00000011c0)="f1000000", 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 846.823874] 0000000098e46334: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 846.906316] XFS (loop2): SB sanity check failed [ 846.911972] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 846.935200] 00000000d349f416: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 846.960788] FAT-fs (loop1): bogus number of reserved sectors [ 847.011178] FAT-fs (loop1): Can't find a valid FAT filesystem [ 847.019925] 00000000f236a477: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 847.033195] XFS (loop2): Unmount and run xfs_repair [ 847.064628] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 847.085962] 000000002583ccae: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 12:12:01 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0fff027400f8000000000283224ea4224b5494fab2", 0x25}], 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 847.119605] 0000000055d24f59: 58 46 53 42 06 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 12:12:01 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) [ 847.167349] 000000003b5ca12b: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 847.199717] 0000000088e1785c: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 847.226172] 000000003878dd28: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 847.239755] FAT-fs (loop1): bogus number of reserved sectors [ 847.263868] 0000000050c6eb65: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 847.280873] FAT-fs (loop1): Can't find a valid FAT filesystem [ 847.292916] 000000004f55453d: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 847.305709] 00000000adb33f68: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 847.332728] 000000009c1c79a1: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 847.332766] XFS (loop5): SB validate failed with error -117. [ 847.341959] 000000000f4bc55f: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 847.356808] 00000000c10709af: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 847.366045] 00000000285f0b46: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 847.375197] XFS (loop2): SB validate failed with error -117. 12:12:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200051000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:12:01 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 12:12:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534238011000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 847.485567] XFS (loop0): Invalid superblock magic number 12:12:01 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) [ 847.580970] FAT-fs (loop1): bogus number of reserved sectors [ 847.586829] FAT-fs (loop1): Can't find a valid FAT filesystem 12:12:01 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 12:12:01 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) write(0xffffffffffffffff, &(0x7f00000011c0)="f1000000", 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) 12:12:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffc0000001, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 847.747808] XFS (loop5): SB sanity check failed [ 847.754805] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 847.792205] FAT-fs (loop1): bogus number of reserved sectors [ 847.805115] FAT-fs (loop1): Can't find a valid FAT filesystem [ 847.818181] XFS (loop2): SB sanity check failed [ 847.823968] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 847.847345] XFS (loop5): Unmount and run xfs_repair [ 847.882015] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 847.900323] XFS (loop2): Unmount and run xfs_repair 12:12:01 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 847.929105] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 847.942766] 00000000dd6ef559: 58 46 53 42 00 05 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 847.969027] 00000000758e656f: 58 46 53 42 38 01 10 00 00 00 00 00 00 00 10 00 XFSB8........... [ 847.987757] 00000000757ecf0a: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 848.002636] FAT-fs (loop1): bogus number of reserved sectors [ 848.014477] 00000000ac21c485: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 848.031226] FAT-fs (loop1): Can't find a valid FAT filesystem [ 848.031363] 00000000f6ef2568: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 848.059761] 00000000db70f86a: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 848.099796] 0000000061edd9cb: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 848.107916] 000000004cb55486: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 848.118067] 00000000550eebd7: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 848.127261] 0000000044292391: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 848.136554] 0000000025c76b52: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 848.145747] 00000000b6edab5a: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 848.155130] XFS (loop5): SB validate failed with error -117. [ 848.172284] 0000000066710a61: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 848.181587] 0000000098dc4ba8: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ 12:12:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) [ 848.192499] 0000000093c634ef: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 848.201910] 00000000b09251d4: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 848.211119] XFS (loop2): SB validate failed with error -117. 12:12:02 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)}], 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 848.284642] FAT-fs (loop1): bogus number of reserved sectors [ 848.291365] FAT-fs (loop1): Can't find a valid FAT filesystem 12:12:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200081000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:12:02 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)}], 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 12:12:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) 12:12:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="58465342c4001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 848.495350] FAT-fs (loop1): bogus number of reserved sectors [ 848.536382] FAT-fs (loop1): Can't find a valid FAT filesystem 12:12:02 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) write(0xffffffffffffffff, &(0x7f00000011c0)="f1000000", 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) 12:12:02 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)}], 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 12:12:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 848.738844] XFS (loop5): SB sanity check failed [ 848.745737] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 12:12:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff]}) [ 848.787062] XFS (loop2): SB sanity check failed [ 848.787161] XFS (loop5): Unmount and run xfs_repair [ 848.797814] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 848.809153] FAT-fs (loop1): bogus number of reserved sectors [ 848.816548] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 848.816596] 000000009ac48b79: 58 46 53 42 00 08 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 848.846009] FAT-fs (loop1): Can't find a valid FAT filesystem [ 848.846273] XFS (loop2): Unmount and run xfs_repair [ 848.893161] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 848.902198] 0000000015c777d9: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 848.922236] 00000000cf442f1f: 58 46 53 42 c4 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 12:12:02 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0fff02", 0x13}], 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 848.950336] 00000000669ed246: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 848.954235] 000000006e8e676d: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 848.980004] 0000000006787961: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 848.988539] 000000002d5f10fd: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 849.001904] 00000000c544168e: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 849.017038] XFS (loop0): Invalid superblock magic number [ 849.036543] FAT-fs (loop1): invalid media value (0x00) [ 849.038037] 00000000eb2c8461: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 849.050405] 00000000d109464b: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 849.060774] 00000000171e798a: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 849.067188] FAT-fs (loop1): Can't find a valid FAT filesystem [ 849.087015] 000000007b383bc9: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 849.090566] 000000002e3509ac: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 849.115589] 000000001dafe04d: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 849.129325] 000000004f4386b6: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 849.139783] XFS (loop5): SB validate failed with error -117. 12:12:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) [ 849.146176] 00000000cde532c3: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ 12:12:03 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0fff02", 0x13}], 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 12:12:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6c00, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 849.196784] XFS (loop2): SB validate failed with error -117. [ 849.258279] FAT-fs (loop1): invalid media value (0x00) 12:12:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200031000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:12:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534202801000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:12:03 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0fff02", 0x13}], 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 849.298861] FAT-fs (loop1): Can't find a valid FAT filesystem [ 849.397214] FAT-fs (loop1): invalid media value (0x00) [ 849.444655] FAT-fs (loop1): Can't find a valid FAT filesystem 12:12:03 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0)="f1000000", 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) 12:12:03 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0fff027400f8000000000283", 0x1c}], 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 849.587039] XFS (loop5): SB sanity check failed [ 849.591824] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 849.617564] XFS (loop2): SB sanity check failed [ 849.628203] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 12:12:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000]}) [ 849.672488] XFS (loop5): Unmount and run xfs_repair [ 849.680189] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 849.686889] 00000000595aa7cd: 58 46 53 42 00 03 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 849.710299] XFS (loop2): Unmount and run xfs_repair [ 849.719546] FAT-fs (loop1): bogus number of directory entries (767) [ 849.766266] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 849.788008] FAT-fs (loop1): Can't find a valid FAT filesystem [ 849.790273] 00000000474e29a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 849.818449] 000000002f9551b3: 58 46 53 42 02 80 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 849.840248] 0000000003d68b33: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 849.849619] 0000000007f0f4a8: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 849.870806] 0000000049b200f0: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 849.879701] 000000008f5eb2e3: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 849.900359] 00000000b34eef23: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 849.909287] 00000000629170e8: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... 12:12:03 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0)="f1000000", 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) 12:12:03 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0fff027400f8000000000283", 0x1c}], 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 849.909299] 000000007edb490f: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 849.934236] XFS (loop5): SB validate failed with error -117. 12:12:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="58465342000a1000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 850.018597] FAT-fs (loop1): bogus number of directory entries (767) [ 850.027452] XFS (loop5): unknown mount option [/dev/loop0]. [ 850.046471] XFS (loop0): Invalid superblock magic number [ 850.051037] FAT-fs (loop1): Can't find a valid FAT filesystem [ 850.059322] 000000004a876ee2: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 12:12:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) [ 850.075011] 00000000cbab16e4: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 850.093065] 0000000022fe26ed: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 12:12:04 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0fff027400f8000000000283", 0x1c}], 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 850.153396] 00000000fb194c09: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ 12:12:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1000000000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) 12:12:04 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0)="f1000000", 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 850.195156] 00000000d6f34629: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 850.235079] 00000000e8059c8e: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 850.290429] XFS (loop2): SB validate failed with error -117. 12:12:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="58465342000b1000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:12:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) [ 850.426154] FAT-fs (loop1): bogus number of directory entries (767) [ 850.436820] XFS (loop5): SB sanity check failed [ 850.443423] FAT-fs (loop1): Can't find a valid FAT filesystem [ 850.447501] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 850.531590] XFS (loop5): Unmount and run xfs_repair 12:12:04 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0)="f1000000", 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r2, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{}], 0x1, 0xfff) dup3(0xffffffffffffffff, r0, 0x0) [ 850.573189] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 850.611047] XFS (loop2): SB sanity check failed [ 850.611307] 00000000dd6ef559: 58 46 53 42 00 0a 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 850.615941] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 850.678642] 00000000757ecf0a: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 850.720114] XFS (loop2): Unmount and run xfs_repair [ 850.734915] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 850.744416] 00000000f6ef2568: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 850.755476] 00000000f1f88aac: 58 46 53 42 00 0b 10 00 00 00 00 00 00 00 10 00 XFSB............ 12:12:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) [ 850.791945] 0000000022733c52: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 850.793981] 000000004cb55486: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 850.842942] 00000000550eebd7: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 850.844651] 000000005ead9da5: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 850.884919] 0000000044292391: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 850.914363] 00000000da0ed497: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 850.924945] 0000000025c76b52: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 850.957878] 000000002f1b4ccf: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 850.965006] 00000000b6edab5a: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 850.997344] XFS (loop5): SB validate failed with error -117. [ 850.999109] 00000000c5557342: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 851.013005] 00000000c2584839: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 851.022103] 0000000091dc9c62: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 851.032139] XFS (loop2): SB validate failed with error -117. 12:12:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000000040000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:12:05 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0fff027400f8000000000283224ea4224b", 0x21}], 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 12:12:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534258820300000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:12:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) [ 851.181134] XFS (loop0): Invalid superblock magic number 12:12:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7a000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 851.262020] FAT-fs (loop1): bogus number of directory entries (767) [ 851.268656] FAT-fs (loop1): Can't find a valid FAT filesystem [ 851.279129] XFS (loop5): SB sanity check failed [ 851.284754] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 851.324618] XFS (loop5): Unmount and run xfs_repair [ 851.335435] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 851.353984] 00000000fed61139: 58 46 53 42 00 00 00 00 04 00 00 00 00 00 10 00 XFSB............ 12:12:05 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0fff027400f8000000000283224ea4224b", 0x21}], 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 851.383897] 0000000094c99f6b: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 851.434195] 0000000020a008af: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 851.458584] FAT-fs (loop1): bogus number of directory entries (767) [ 851.479787] XFS (loop2): SB sanity check failed [ 851.487727] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 851.517345] FAT-fs (loop1): Can't find a valid FAT filesystem 12:12:05 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0)="f1000000", 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 851.535361] 000000008de44299: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 851.578944] XFS (loop2): Unmount and run xfs_repair [ 851.593514] 00000000f92d6cec: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 12:12:05 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0fff027400f8000000000283224ea4224b", 0x21}], 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 851.639214] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 851.665151] 00000000ccc60b35: 58 46 53 42 58 82 03 00 00 00 00 00 00 00 10 00 XFSBX........... 12:12:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) [ 851.676318] 00000000d984e1eb: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 851.751796] 00000000347c3345: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 851.762124] 00000000114d257e: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 851.779002] FAT-fs (loop1): bogus number of directory entries (767) [ 851.793561] FAT-fs (loop1): Can't find a valid FAT filesystem [ 851.809537] 00000000b5eedd8d: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 851.822913] 0000000035455082: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 851.857596] 00000000bf93b9bc: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 851.870744] XFS (loop5): SB validate failed with error -117. [ 851.897888] 000000009d0e5a0e: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 12:12:06 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0fff027400f8000000000283224ea4224b5494", 0x23}], 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 851.967282] 0000000088d5b552: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 851.976507] 0000000002e4f86b: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 851.986453] 0000000079bca145: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 851.996655] XFS (loop2): SB validate failed with error -117. 12:12:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534210030000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:12:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000000080000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:12:06 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0fff027400f8000000000283224ea4224b5494", 0x23}], 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 852.094319] FAT-fs (loop1): bogus number of directory entries (767) [ 852.111152] FAT-fs (loop1): Can't find a valid FAT filesystem 12:12:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) [ 852.153491] XFS (loop0): Invalid superblock magic number 12:12:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8cffffff, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 852.278544] FAT-fs (loop1): bogus number of directory entries (767) [ 852.309105] FAT-fs (loop1): Can't find a valid FAT filesystem 12:12:06 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0fff027400f8000000000283224ea4224b5494", 0x23}], 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 852.336456] XFS (loop5): SB sanity check failed [ 852.341647] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 12:12:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000]}) [ 852.388825] XFS (loop5): Unmount and run xfs_repair 12:12:06 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0)="f1000000", 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 852.425455] XFS (loop2): SB sanity check failed [ 852.431085] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 852.471551] FAT-fs (loop1): bogus number of directory entries (767) [ 852.485817] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 852.513758] FAT-fs (loop1): Can't find a valid FAT filesystem [ 852.521463] 000000009f0670a9: 58 46 53 42 00 00 00 00 08 00 00 00 00 00 10 00 XFSB............ [ 852.536309] XFS (loop2): Unmount and run xfs_repair [ 852.555285] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 852.573786] 000000003a3ddf1b: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 852.592079] 00000000b4d782f6: 58 46 53 42 10 03 00 00 00 00 00 00 00 00 10 00 XFSB............ [ 852.624153] 000000007b184b7d: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 852.645381] 0000000035fedb22: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 852.666662] 000000003767d47d: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 852.692699] 00000000bba56e18: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 852.715560] 0000000017a98939: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 852.735059] 00000000fffaeb59: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 852.757861] 00000000772f1e82: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 852.777776] 00000000c000e6c2: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 852.798131] 00000000409e768e: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 852.817247] 00000000c1ec3733: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 852.837939] 000000002b5448f3: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 852.839531] 00000000ccc2d767: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 852.847294] 00000000d45c1813: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 852.865732] XFS (loop2): SB validate failed with error -117. 12:12:06 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0fff027400f8000000000283224ea4224b5494fa", 0x24}], 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 852.897043] XFS (loop5): SB validate failed with error -117. 12:12:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000008000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:12:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="58465342000d1000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 853.018553] FAT-fs (loop1): bogus number of directory entries (767) [ 853.027922] XFS (loop0): Invalid superblock magic number 12:12:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 12:12:07 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0fff027400f8000000000283224ea4224b5494fa", 0x24}], 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 853.066819] FAT-fs (loop1): Can't find a valid FAT filesystem 12:12:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4800, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 853.217046] FAT-fs (loop1): bogus number of directory entries (767) [ 853.233549] FAT-fs (loop1): Can't find a valid FAT filesystem [ 853.250819] XFS (loop5): SB sanity check failed [ 853.255926] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 12:12:07 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0fff027400f8000000000283224ea4224b5494fa", 0x24}], 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 12:12:07 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0)="f1000000", 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 853.277714] XFS (loop2): SB sanity check failed [ 853.285220] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 853.302599] XFS (loop5): Unmount and run xfs_repair [ 853.318776] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 853.374544] 00000000a8c170a8: 58 46 53 42 00 0d 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 853.396029] XFS (loop2): Unmount and run xfs_repair [ 853.425285] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 853.433478] FAT-fs (loop1): bogus number of directory entries (767) [ 853.445335] 00000000be793dee: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 853.466261] 00000000f81e4db9: 58 46 53 42 00 00 00 08 00 00 00 00 00 00 10 00 XFSB............ [ 853.490713] FAT-fs (loop1): Can't find a valid FAT filesystem [ 853.500103] 00000000cf61a575: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 853.522142] 0000000003c88012: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 853.532372] 000000007004e84c: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 12:12:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff00000000]}) [ 853.548600] 000000001f658e1a: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 853.559168] 00000000af79c1c2: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ 12:12:07 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0fff027400f8000000000283224ea4224b5494fab2", 0x25}], 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 853.605310] 00000000ab7640c5: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 853.627389] 00000000e506c571: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 853.692269] 0000000001b16c09: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 853.712007] 000000009cb56524: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 853.733707] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 853.755597] 00000000608dabd3: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 853.777838] 00000000f2f674d1: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 853.793632] FAT-fs (loop1): bogus number of directory entries (767) [ 853.815219] 000000009f705a41: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 853.829534] 00000000ebd79023: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 853.839838] FAT-fs (loop1): Can't find a valid FAT filesystem 12:12:07 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0fff027400f8000000000283224ea4224b5494fab2", 0x25}], 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 853.874362] XFS (loop5): SB validate failed with error -117. [ 853.894518] XFS (loop2): SB validate failed with error -117. 12:12:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 12:12:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534219001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:12:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000372340000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 854.048254] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 854.080006] XFS (loop0): Invalid superblock magic number [ 854.088367] FAT-fs (loop1): bogus number of directory entries (767) [ 854.112259] FAT-fs (loop1): Can't find a valid FAT filesystem [ 854.149081] XFS (loop2): SB sanity check failed [ 854.162774] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 12:12:08 executing program 4: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000540)=""/246) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{0xffffffffffffffff, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0)="f1000000", 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r2, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xfff) dup3(r0, 0xffffffffffffffff, 0x0) [ 854.216775] XFS (loop2): Unmount and run xfs_repair [ 854.226768] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 854.243813] 00000000545c5f0f: 58 46 53 42 19 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 854.257850] 00000000898794de: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 12:12:08 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0fff027400f8000000000283224ea4224b5494fab2", 0x25}], 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 12:12:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffff7f, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 854.283090] 00000000289e35ab: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 854.297243] 00000000a98b44bf: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 854.310583] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 854.330473] 00000000749d0be4: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 854.345448] FAT-fs (loop1): bogus number of directory entries (767) [ 854.354983] FAT-fs (loop1): Can't find a valid FAT filesystem [ 854.361698] 0000000096bce5ec: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 854.376490] XFS (loop5): SB sanity check failed [ 854.389045] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 854.404220] 000000009d8273c9: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 854.413501] XFS (loop5): Unmount and run xfs_repair [ 854.418908] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 854.426148] 0000000082551920: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 854.436693] 000000001757ddcc: 58 46 53 42 00 00 03 72 34 00 00 00 00 00 10 00 XFSB...r4....... [ 854.446147] XFS (loop2): SB validate failed with error -117. [ 854.453623] 00000000ff02bb88: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 854.464716] 000000008c99470f: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 12:12:08 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0fff027400f8000000000283224ea4224b5494fab2", 0x25}], 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 854.492263] 00000000ec98eefb: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 854.548166] 000000005fb47a09: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 854.575801] 00000000ecf74560: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ 12:12:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534214001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 854.601452] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 854.603875] 00000000e3ad90c9: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 854.640515] FAT-fs (loop1): bogus number of directory entries (767) 12:12:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff]}) [ 854.671282] FAT-fs (loop1): Can't find a valid FAT filesystem [ 854.699706] 0000000088122d0f: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 854.730501] XFS (loop5): SB validate failed with error -117. 12:12:08 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0fff027400f8000000000283224ea4224b5494fab2", 0x25}], 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 854.811800] XFS (loop2): SB sanity check failed [ 854.822363] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 854.876082] XFS (loop2): Unmount and run xfs_repair [ 854.889884] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 854.900014] 00000000c46aeac5: 58 46 53 42 14 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 12:12:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="584653420000037dcc0000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 854.977289] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 854.979752] 0000000015ef52dd: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 855.018412] FAT-fs (loop1): bogus number of directory entries (767) 12:12:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) [ 855.059676] FAT-fs (loop1): Can't find a valid FAT filesystem [ 855.069406] 00000000aed7cf57: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 855.082532] 00000000a840bf5d: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ 12:12:09 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0)="f1000000", 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) 12:12:09 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0fff027400f8000000000283224ea4224b5494fab2", 0x25}], 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 855.184010] 00000000a5c9ca35: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 855.268818] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 855.284694] 00000000a89ef1b0: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 855.307697] XFS (loop5): SB sanity check failed 12:12:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x40000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 855.318329] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 855.373730] FAT-fs (loop1): bogus number of directory entries (767) [ 855.383869] 0000000023d51fb9: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 855.406711] FAT-fs (loop1): Can't find a valid FAT filesystem [ 855.417120] XFS (loop5): Unmount and run xfs_repair [ 855.434357] 00000000ef5734dc: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 855.447414] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 855.478428] 000000001ce001c0: 58 46 53 42 00 00 03 7d cc 00 00 00 00 00 10 00 XFSB...}........ [ 855.493579] XFS (loop2): SB validate failed with error -117. 12:12:09 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0fff027400f8000000000283224ea4224b5494fab2", 0x25}], 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) [ 855.518854] 0000000056328826: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 855.551298] 00000000ae70acdb: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 12:12:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff00000000]}) 12:12:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="58465342037c1000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 855.688076] 0000000070bef145: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 855.727034] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 855.781672] 000000000e17c838: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 855.797653] FAT-fs (loop1): bogus number of directory entries (767) [ 855.839896] FAT-fs (loop1): Can't find a valid FAT filesystem [ 855.859464] 000000004d49cac1: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ 12:12:09 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0fff027400f8000000000283224ea4224b5494fab2", 0x25}], 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) [ 855.911687] 0000000051cd3663: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 855.934679] 00000000e5f7d46c: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 855.939667] XFS (loop2): SB sanity check failed [ 855.944231] XFS (loop5): SB validate failed with error -117. [ 855.948539] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 855.974870] XFS (loop2): Unmount and run xfs_repair [ 855.982150] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 855.989286] 0000000081c21a7f: 58 46 53 42 03 7c 10 00 00 00 00 00 00 00 10 00 XFSB.|.......... 12:12:10 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0)="f1000000", 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 856.017361] 000000008f3f06d5: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 856.057010] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 12:12:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200021000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:12:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) [ 856.078627] FAT-fs (loop1): bogus number of directory entries (767) [ 856.085620] 000000009a93980a: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 856.103856] XFS (loop0): Invalid superblock magic number [ 856.135669] FAT-fs (loop1): Can't find a valid FAT filesystem [ 856.144926] 000000009f1e1031: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 856.177497] 00000000cd6b5a95: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 856.193670] 00000000441021ab: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 856.233171] 00000000dc9e0517: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 856.264703] XFS (loop5): SB sanity check failed [ 856.269776] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 12:12:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) 12:12:10 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b660800666174000204010a0fff027400f8000000000283224ea4224b5494fab2", 0x25}], 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) [ 856.281959] XFS (loop5): Unmount and run xfs_repair [ 856.285413] 00000000f3b5eaa5: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 856.287412] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 856.339809] XFS (loop2): SB validate failed with error -117. [ 856.343439] 000000003597abda: 58 46 53 42 00 02 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 856.395944] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 856.405665] 00000000d5f5f33b: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 856.432919] FAT-fs (loop1): bogus number of directory entries (767) [ 856.451314] 00000000b4f9c9e0: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 856.465754] FAT-fs (loop1): Can't find a valid FAT filesystem [ 856.472081] 00000000be2f44af: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ 12:12:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200071000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 856.501583] 00000000e3c4bd7f: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 856.529278] XFS (loop0): Invalid superblock magic number [ 856.555702] 000000009b393c02: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ 12:12:10 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000440)={"73797a5f74756e0000000000010800"}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="080008008402000014000100fe8000000000000000000000000000aa"], 0x1}}, 0x0) [ 856.663226] 00000000b10dc15d: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... 12:12:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff]}) 12:12:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x97ffffff00000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) 12:12:10 executing program 1: rmdir(&(0x7f0000000400)='./file0/file0\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000140)='fd\x00') exit(0x0) getdents64(r0, &(0x7f0000000340)=""/57, 0x252) [ 856.708774] 00000000db074327: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 856.730544] XFS (loop5): SB validate failed with error -117. [ 856.854802] XFS (loop2): SB sanity check failed [ 856.859757] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 856.892249] XFS (loop2): Unmount and run xfs_repair 12:12:10 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0)="f1000000", 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) 12:12:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200041000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 856.915537] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 856.947474] 0000000074d175ba: 58 46 53 42 00 07 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 857.022576] 00000000c0fbfef1: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 857.079049] 000000009d059f2f: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 857.108602] 0000000045b965da: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ 12:12:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) [ 857.136394] 000000008b7a9c7a: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 857.167397] 00000000cf59419f: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 857.203467] 00000000c123d935: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 857.238455] 0000000051d870ca: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 857.275528] XFS (loop5): SB sanity check failed [ 857.280701] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 857.303312] XFS (loop2): SB validate failed with error -117. [ 857.332023] XFS (loop5): Unmount and run xfs_repair [ 857.362756] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 857.425335] 000000009cbfff9c: 58 46 53 42 00 04 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 857.459225] 00000000b8293a6e: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 12:12:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200121000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 857.468916] 00000000ae8c7e2d: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 857.478591] 000000006238f945: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 857.507908] 000000004361efde: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 857.524822] 00000000936e551a: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 857.544945] 00000000fac35c24: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 857.554422] 0000000019f2193c: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 857.564563] XFS (loop5): SB validate failed with error -117. 12:12:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) [ 857.665241] XFS (loop0): Invalid superblock magic number 12:12:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_genetlink_get_family_id$fou(&(0x7f0000000100)="666f75fc") 12:12:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200741000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 857.713455] XFS (loop2): SB sanity check failed [ 857.718338] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 12:12:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xc0000001, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) 12:12:11 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0)="f1000000", 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 857.795110] XFS (loop2): Unmount and run xfs_repair [ 857.806960] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 857.880543] 00000000aca4b22b: 58 46 53 42 00 12 10 00 00 00 00 00 00 00 10 00 XFSB............ 12:12:11 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000000)={0xfffffffffffffffa}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x1000000000000017, 0x4, @tid=r0}, &(0x7f00008ec000)) timer_settime(0x0, 0x0, &(0x7f000004a000)={{0x0, 0x1}, {0x0, 0xe4c}}, &(0x7f0000040000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) rt_sigsuspend(&(0x7f0000000040), 0x8) 12:12:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000]}) [ 857.958490] 00000000b43bd818: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 858.015661] XFS (loop5): SB sanity check failed [ 858.017964] 000000008dd69cf4: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 858.021126] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 858.036090] 00000000e0ee02e5: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ 12:12:12 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000100)={0x0, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0)="f1000000", 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 858.106401] 00000000b9dbcf98: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 858.134392] XFS (loop5): Unmount and run xfs_repair [ 858.158405] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 858.158610] 0000000008051677: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 858.191639] 000000003b5ba0d0: 58 46 53 42 00 74 10 00 00 00 00 00 00 00 10 00 XFSB.t.......... [ 858.200835] 00000000a2e26b2f: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 858.209945] 00000000e918e83b: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 858.235732] 00000000de255e61: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 858.245146] XFS (loop2): SB validate failed with error -117. 12:12:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) [ 858.272734] 00000000f9f4b640: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 858.288799] 0000000017a969a1: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ 12:12:12 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000100)) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0)="f1000000", 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 858.358477] 000000002fe110dd: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 12:12:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200231000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 858.424949] 00000000e6bfaafc: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 858.453638] 000000009b7fe137: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 858.478871] 0000000081914240: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 858.511288] XFS (loop5): SB validate failed with error -117. 12:12:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) [ 858.572748] XFS (loop0): Invalid superblock magic number 12:12:12 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000100)) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0)="f1000000", 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 858.614499] XFS (loop2): SB sanity check failed [ 858.619332] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 858.631421] XFS (loop2): Unmount and run xfs_repair [ 858.650758] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 858.664947] 0000000064d1767e: 58 46 53 42 00 23 10 00 00 00 00 00 00 00 10 00 XFSB.#.......... [ 858.692570] 000000006cd92e2f: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 858.709985] 00000000ddd27bd4: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 12:12:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="58465342000003850c0000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 858.765172] 00000000fbe3570d: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ 12:12:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 858.806847] 0000000077ba04dc: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 12:12:12 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) rmdir(&(0x7f0000000400)='./file0/file0\x00') ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000180)={'bridge0\x00'}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='fd\x00') exit(0x0) getdents64(r1, &(0x7f0000000340)=""/57, 0x252) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) [ 858.850401] 00000000f8fa8906: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ 12:12:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) [ 858.923067] 00000000bbff3d18: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 858.980934] 000000007fc29b0f: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 859.020507] XFS (loop5): SB sanity check failed 12:12:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='fd\x00') getdents64(r0, &(0x7f0000000100)=""/57, 0x26) [ 859.025329] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 859.043855] XFS (loop2): SB validate failed with error -117. [ 859.087940] XFS (loop5): Unmount and run xfs_repair 12:12:13 executing program 1: syz_genetlink_get_family_id$fou(&(0x7f0000000100)="666f75fc") [ 859.114577] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 859.147501] 000000001e7cf3a9: 58 46 53 42 00 00 03 85 0c 00 00 00 00 00 10 00 XFSB............ 12:12:13 executing program 1: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e1086dd", &(0x7f0000000140)=""/41, 0x69}, 0x28) [ 859.188403] 0000000035166aa9: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 859.227374] 000000008614de04: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 859.269451] 000000004d5b33fa: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ 12:12:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 12:12:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534208001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 859.315300] 000000007df35bd6: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 859.330268] 00000000a82ec601: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 859.339225] 000000002e6f31fc: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 859.348489] 0000000008685285: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 859.358735] XFS (loop5): SB validate failed with error -117. 12:12:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000000)=[@text32={0x20, &(0x7f0000000100)="0f0f308a0f001166b8df008ec0c4e3e148ff0b0f00948bfdff00000fc7af00280000c4e21d0d96dcd80000b9da020000b80d000000ba000000000f30c4e2f5aff966b89d000f00d0", 0x48}], 0x1, 0x31, &(0x7f0000000180), 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000080)={0x20003}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 12:12:13 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000100)) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0)="f1000000", 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) 12:12:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001200000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 859.571798] XFS (loop0): Invalid superblock magic number [ 859.623394] XFS (loop2): SB sanity check failed [ 859.645482] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 12:12:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0xe900000000000000}, 0xca87a339495393, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv6_newaddr={0x40, 0x14, 0x509, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xf0ffff40000000}}, @IFA_LOCAL={0x14, 0x2, @local}]}, 0x40}}, 0x0) [ 859.704399] XFS (loop2): Unmount and run xfs_repair [ 859.716038] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 859.729828] 0000000036b167e2: 58 46 53 42 08 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 859.733837] XFS (loop5): unknown mount option [/dev/loop0]. [ 859.744954] 0000000090657d36: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 12:12:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4c00000000000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) 12:12:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) [ 859.745021] 0000000051636817: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 859.745122] 00000000cb8df147: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 859.745315] 000000009526a112: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 859.745355] 000000002382c6d1: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 859.745481] 0000000001d0391a: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... 12:12:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x40000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 859.745582] 000000008f12e6c6: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 859.745804] XFS (loop2): SB validate failed with error -117. 12:12:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200221000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:12:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534204001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 860.114085] XFS (loop5): SB sanity check failed [ 860.119030] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 12:12:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x5, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000080)="0f229e9a09000000210136f20f587e400f01c936670f0179420f017019648361ce3166ba6100ec0f0f46db1c650f07", 0x2f}], 0x1, 0x0, &(0x7f0000000080), 0x1000000000000169) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e0001000000000000000000"]) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae9c, &(0x7f00000001c0)={0x3}) [ 860.192935] XFS (loop5): Unmount and run xfs_repair [ 860.276313] XFS (loop5): First 128 bytes of corrupted metadata buffer: 12:12:14 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000100)) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0)="f1000000", 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 860.340907] 00000000ddbb0c65: 58 46 53 42 00 22 10 00 00 00 00 00 00 00 10 00 XFSB.".......... [ 860.437792] 000000007884f390: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 860.447132] 000000002364175d: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 860.456608] 00000000c60dddac: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 860.461594] XFS (loop2): SB sanity check failed [ 860.502324] 00000000afe03720: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 860.502533] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 860.523442] 00000000a2a484fa: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 860.560537] 00000000eeb5b92a: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 860.605185] 00000000f70cdb2b: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 860.626696] XFS (loop2): Unmount and run xfs_repair [ 860.640621] XFS (loop5): SB validate failed with error -117. [ 860.654043] XFS (loop2): First 128 bytes of corrupted metadata buffer: 12:12:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x800, 0x4) ioctl$TIOCLINUX5(r2, 0x541c, &(0x7f0000000140)={0x5, 0x4, 0x3, 0x3, 0x7f}) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae9c, &(0x7f00000001c0)={0x3}) [ 860.687349] 0000000015ae84fa: 58 46 53 42 04 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 860.702237] 000000005a353180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 860.719427] XFS (loop1): Invalid superblock magic number [ 860.735539] 0000000019480aa0: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 860.747203] 00000000f50595c0: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ 12:12:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xea020000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) 12:12:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="584653420000037dcc0000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:12:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000900000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 860.779468] 0000000091cbd5cd: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 860.795292] 000000001cc9c8ea: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 860.806227] 00000000497f88b4: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 860.840776] 000000002ffa583b: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 860.878857] XFS (loop2): SB validate failed with error -117. 12:12:15 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000002c0)={0x81}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x86100, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) setrlimit(0x6, &(0x7f0000000000)={0x3ff, 0x3ff}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = syz_open_dev$admmidi(&(0x7f0000000240)='/dev/admmidi#\x00', 0x7fffffff, 0x2000) ioctl$RTC_AIE_ON(r5, 0x7001) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae9c, &(0x7f00000001c0)={0x3}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000080)="f66367726f757000"}, 0x30) getpgrp(r6) [ 861.003116] XFS (loop5): SB sanity check failed [ 861.008059] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 12:12:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534201381000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 861.059585] XFS (loop5): Unmount and run xfs_repair [ 861.092736] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 861.105830] XFS (loop1): SB sanity check failed [ 861.121335] 000000003376196c: 58 46 53 42 00 00 09 00 00 00 00 00 00 00 10 00 XFSB............ 12:12:15 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000100)) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0), 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 861.162625] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 861.185514] 00000000f0d99a2a: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 861.266129] XFS (loop1): Unmount and run xfs_repair [ 861.275286] 0000000004128c8c: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 12:12:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100002}, 0xc, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x4008001) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3}) [ 861.324231] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 861.367990] 000000007a99b037: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 861.383959] 000000000861722b: 58 46 53 42 00 00 03 7d cc 00 00 00 00 00 10 00 XFSB...}........ [ 861.424710] XFS (loop2): SB sanity check failed [ 861.428360] 00000000a9f90dc1: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 861.429640] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 861.452042] XFS (loop2): Unmount and run xfs_repair [ 861.457107] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 861.457203] 000000009cbfff9c: 58 46 53 42 01 38 10 00 00 00 00 00 00 00 10 00 XFSB.8.......... [ 861.473996] 00000000b8293a6e: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 861.482116] 0000000069a07014: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 861.483416] 00000000ae8c7e2d: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 861.501364] 000000006238f945: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 861.510625] 000000004361efde: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 861.519595] 00000000936e551a: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 861.528975] 00000000fac35c24: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 861.538807] 0000000019f2193c: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 861.548453] 000000004e7dd715: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 861.558998] 00000000b4ef3511: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 12:12:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534203fa1000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 861.570514] XFS (loop2): SB validate failed with error -117. [ 861.577595] 00000000ee82f819: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 861.589126] 000000004c5fc196: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ 12:12:15 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000100)) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0), 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 861.644642] 000000002af30a15: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 861.661279] 00000000f66ada52: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 861.735541] XFS (loop5): SB validate failed with error -117. [ 861.750025] 00000000b6e3aa1a: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 861.767661] 00000000c616a7af: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... 12:12:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000240)=ANY=[@ANYBLOB="01000080001e00fb034d56ef9993096d71baa04df0b0fc6848538713d5ba9f4429c703518fa8eb7c328bce6885728d93a5e94c89a35a8bced1cfbf3dc88beab3bcd7e51aa052c5985cf067dafa1c8117fb717855c12036e3cc483c3808ce5cda80a4eb547ca9dcbb3349ee0c48a3f532e87f0e9fd9f02824d62a3f36707a513e5cbd67c8d06a3b5081fc7048eb167daecd622624fe99d500fd262f006973b282d3c4dc48f45528eaa511c0b5d44ace83ef1376060222216073745bea34caa261135a9e6b7fa82a79179415aa84044bbd54d1912a5a39168ccc6a20c2204cf2e0a0802373bfb6648a751ba9858954392ee700ed34cf377c1f4b055496ff4567d8ff91c2d438fa0d40c0811712b4e6f0f882d37ceec3d56ebc9c432ddeb1d9a5ebed1243f952e5f986cc6b2d1c88ffdee2bcc97aa48d5c3c42ff"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3}) 12:12:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="584653420000036f240000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:12:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf00, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 861.784284] 00000000fbc5157f: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 861.814200] XFS (loop1): SB validate failed with error -117. 12:12:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534201381000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:12:15 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000100)) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0), 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 861.933551] XFS (loop2): SB sanity check failed [ 861.938422] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 862.016321] XFS (loop5): SB sanity check failed [ 862.021511] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 862.033299] XFS (loop5): Unmount and run xfs_repair [ 862.038875] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 862.046504] 0000000014f9f013: 58 46 53 42 00 00 03 6f 24 00 00 00 00 00 10 00 XFSB...o$....... [ 862.056515] 0000000096960ac9: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 862.068461] 000000006600682b: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 862.078376] 000000009978948b: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 862.084633] XFS (loop2): Unmount and run xfs_repair [ 862.087794] 0000000022eb8754: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 862.103179] 00000000d4c70e40: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 862.112383] 00000000a0c057aa: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 862.122036] 000000008fc8cab5: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 862.131554] XFS (loop5): SB validate failed with error -117. [ 862.144858] XFS (loop2): First 128 bytes of corrupted metadata buffer: 12:12:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="58465342000003723c0000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 862.165488] 000000002de1faba: 58 46 53 42 03 fa 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 862.188580] 00000000034747d1: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 12:12:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x82f, 0x400000) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f0000002400)={0x0, 0x0, 0x2080}) mq_getsetattr(r1, &(0x7f0000000240)={0x80000000, 0x85b0, 0x7, 0x1000, 0x1f, 0x101, 0x4, 0x5}, 0x0) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000180)={0x284, 0x7, 0x3, 0x9}) ioctl$KVM_ENABLE_CAP_CPU(r6, 0x4008ae9c, &(0x7f00000001c0)={0x3}) [ 862.210777] 000000008df42555: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 862.227655] 00000000bf50a0ee: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 862.241610] XFS (loop1): SB sanity check failed [ 862.246332] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 12:12:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0xa8bfcc5d8dc6cec0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000080)=ANY=[@ANYRESDEC=r0]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3}) [ 862.295148] XFS (loop5): unknown mount option [/dev/loop0]. [ 862.318001] 00000000d68fcfab: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 862.329835] XFS (loop1): Unmount and run xfs_repair [ 862.336641] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 862.363837] 000000005b7a86b7: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 862.386724] 0000000039333e0a: 58 46 53 42 01 38 10 00 00 00 00 00 00 00 10 00 XFSB.8.......... [ 862.415210] 000000006bcd64c3: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 862.431623] 00000000a28af195: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 862.446779] 00000000eba8945b: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ 12:12:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000372400000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 862.462039] 00000000057ca872: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 862.502487] XFS (loop2): SB validate failed with error -117. [ 862.530839] 0000000084aeb7b6: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ 12:12:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x40, 0x800) ioctl$RNDGETENTCNT(r2, 0x80045200, &(0x7f0000000140)) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x84) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae9c, &(0x7f00000001c0)={0x3}) [ 862.572637] 000000000b0ad7ab: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 862.638103] XFS (loop5): unknown mount option [/dev/loop0]. [ 862.648335] 00000000bced6068: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ 12:12:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200f01000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 862.728150] 00000000907ef558: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... 12:12:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8096980000000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 862.777989] 000000005f4c5839: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 862.793901] XFS (loop1): SB validate failed with error -117. 12:12:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000240)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001edb9614e0d1dae69d675496e5b36153b82d2f4b2b8efbe21667b12287b26040aac6ea82a35d83827a89fd94cb7b3a1aad9caf1a600291acef07f3e1fe31c879ff21500ced5f5260580f130abcf08fdf5a43dd70e5cd11890e252b02e4ac71df6520389b8c8211afa06433209276d3775dae68e"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3}) 12:12:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="584653420000037a400000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:12:16 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000100)) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0), 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 862.901763] XFS (loop2): SB sanity check failed [ 862.906642] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 12:12:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534210030000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 863.020112] XFS (loop2): Unmount and run xfs_repair [ 863.068403] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 863.115773] XFS (loop5): SB sanity check failed [ 863.129556] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 12:12:17 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000100)) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0), 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 863.160284] 000000009e78334e: 58 46 53 42 00 f0 10 00 00 00 00 00 00 00 10 00 XFSB............ 12:12:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x800, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000380)={0x60, 0x0, 0x0, 0x8}) ioctl$DRM_IOCTL_AGP_BIND(r1, 0x40106436, &(0x7f00000003c0)={r2, 0xfffffffffffeffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r5, 0x4008ae89, &(0x7f0000000380)=ANY=[]) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xadce1a3886120b6d, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r6, &(0x7f0000000240)={0x15, 0x110, 0xfa00, {r7, 0x1, 0x0, 0x0, 0x0, @in6={0xa, 0x4e22, 0x0, @empty, 0x9}, @in={0x2, 0x4e21, @remote}}}, 0x118) ioctl$KVM_ENABLE_CAP_CPU(r5, 0x4008ae9c, &(0x7f00000001c0)={0x3}) [ 863.246067] 00000000ca2e456d: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 863.268535] XFS (loop5): Unmount and run xfs_repair [ 863.311553] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 863.344621] 00000000b1ecea5a: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 863.379887] 00000000f4542e6c: 58 46 53 42 00 00 03 7a 40 00 00 00 00 00 10 00 XFSB...z@....... [ 863.380489] 00000000498751ad: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 863.398186] 00000000f8e619ad: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 863.407504] 000000008fb3666f: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 863.417810] 000000006bf990b7: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 863.431298] XFS (loop1): SB sanity check failed [ 863.440426] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 863.456771] 00000000df406999: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 863.473512] XFS (loop2): SB validate failed with error -117. 12:12:17 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000100)) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0), 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r2, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 863.494523] 00000000fb13a343: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 863.537475] XFS (loop1): Unmount and run xfs_repair 12:12:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f00000002c0)={"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"}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xafb146effabcbe96, 0x20) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r3, &(0x7f0000000240)={0xc0000005}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) execve(&(0x7f00000006c0)='./file0\x00', &(0x7f00000008c0)=[&(0x7f0000000700)='/dev/sequencer\x00', &(0x7f0000000740)='/dev/kvm\x00', &(0x7f0000000780)='/dev/sequencer\x00', &(0x7f00000007c0)='userbdevcgroup\x00', &(0x7f0000000800)='/dev/sequencer\x00', &(0x7f0000000840)='/dev/kvm\x00', &(0x7f0000000880)='.!]eth0]!\x00'], &(0x7f0000000980)=[&(0x7f0000000900)='/dev/kvm\x00', &(0x7f0000000940)='/dev/kvm\x00']) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f0000000140)={[{0x0, 0x0, 0x10001, 0x80000001, 0x5, 0x3, 0x1ff, 0x4, 0x7, 0x6, 0x8, 0x4, 0x4}, {0xfff, 0x101, 0x9f, 0x3, 0x2, 0x0, 0x9, 0x5, 0x7, 0xc0000000000000, 0x8, 0xfffffffffffffffc, 0x9}, {0xffffffff80000000, 0x2, 0x5, 0x3, 0x100000000, 0x1, 0x8, 0x3f, 0x1ff, 0x10001, 0x400, 0x4000, 0xfffffffffffff3e7}], 0xffff}) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) setsockopt$bt_hci_HCI_DATA_DIR(r5, 0x0, 0x1, &(0x7f00000009c0)=0x4, 0x4) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae9c, &(0x7f00000001c0)={0x3}) ioctl$KVM_NMI(r4, 0xae9a) [ 863.566435] 000000006a2c6632: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 863.588645] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 863.598891] XFS (loop0): Invalid superblock magic number 12:12:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="584653420fff1000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 863.626446] 00000000ce28a525: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 863.638504] 00000000d3504815: 58 46 53 42 10 03 00 00 00 00 00 00 00 00 10 00 XFSB............ [ 863.649296] 000000000f8ea68f: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 863.658901] 0000000055103a70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 863.696012] 00000000a9abf019: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 863.701366] 00000000a740afa0: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 863.742309] 00000000e5abd589: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... 12:12:17 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000100)) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0), 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) 12:12:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5401, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 863.785935] 000000000de3f1bc: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 863.823911] 00000000dee3fe32: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 863.846888] 000000005697033e: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 863.880213] 0000000095199e8f: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 863.928967] 00000000022976a3: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 863.931233] XFS (loop5): SB validate failed with error -117. [ 863.960849] 0000000043a1a6d8: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 863.970417] XFS (loop2): SB sanity check failed 12:12:18 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000100)) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0), 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 863.975310] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 863.988694] XFS (loop1): SB validate failed with error -117. 12:12:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="0000000001000000000000000000000000"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3}) [ 864.043904] XFS (loop2): Unmount and run xfs_repair 12:12:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200002f00000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:12:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534258820300000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 864.091329] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 864.152057] 00000000d66cae01: 58 46 53 42 0f ff 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 864.238941] 00000000b0a7d0c8: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 12:12:18 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000100)) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0), 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 864.375922] 000000005e7c94f4: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 864.389658] 00000000112d4f8e: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 864.422384] 00000000af4d52bb: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 864.433015] 0000000097765b3d: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 864.442930] 000000001589b269: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 864.453192] 000000002d589717: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 864.463169] XFS (loop2): SB validate failed with error -117. [ 864.474088] XFS (loop5): SB sanity check failed [ 864.480773] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 864.492273] XFS (loop5): Unmount and run xfs_repair [ 864.499036] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 864.506273] 00000000c69a24a3: 58 46 53 42 00 00 2f 00 00 00 00 00 00 00 10 00 XFSB../......... 12:12:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="584653424c7e0300000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 864.515961] 0000000061cda0bb: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 864.539289] 000000009155a06d: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 864.549813] 000000002ce0e857: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 864.559365] 00000000ae6d8119: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 12:12:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x4, 0x418800) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x40000, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000300)='/dev/input/mouse#\x00', 0x8000, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xba) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae9c, &(0x7f00000001c0)={0x3}) getsockname$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e) [ 864.568750] 0000000024b4c808: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 864.580444] XFS (loop0): Invalid superblock magic number [ 864.597197] 000000001fc29d07: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 864.632783] 00000000dab2e9a9: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 12:12:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffdfd, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 864.709569] XFS (loop5): SB validate failed with error -117. [ 864.719854] XFS (loop1): SB sanity check failed [ 864.730546] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 12:12:18 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000100)) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0), 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040), 0x0, 0xfff) dup3(r1, r0, 0x0) [ 864.775140] XFS (loop1): Unmount and run xfs_repair [ 864.788272] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 864.803965] 00000000b2a4a18d: 58 46 53 42 58 82 03 00 00 00 00 00 00 00 10 00 XFSBX........... [ 864.818682] 0000000071a4a30f: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 864.833228] 00000000f60085ab: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 864.865618] 000000007c0d3cfe: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 864.926812] 00000000bce36b76: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 12:12:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3}) [ 864.968704] 000000005b32f0a0: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 865.011599] 0000000069b7e334: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 865.053317] 000000008cfd2a0f: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ 12:12:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="58465342002c1000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 865.094196] XFS (loop1): SB validate failed with error -117. [ 865.103649] XFS (loop2): SB sanity check failed [ 865.118861] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 865.173221] XFS (loop2): Unmount and run xfs_repair [ 865.196558] XFS (loop2): First 128 bytes of corrupted metadata buffer: 12:12:19 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0)="f1000000", 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 865.240199] 00000000bedd8bf8: 58 46 53 42 4c 7e 03 00 00 00 00 00 00 00 10 00 XFSBL~.......... [ 865.249398] 0000000014454d7e: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 865.274951] 0000000050978787: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 865.283910] 0000000056fb6e18: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 865.292821] 000000002ec63394: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 865.330616] 00000000ff28311e: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 865.339495] 000000003b87338f: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 865.339507] 000000009fe44a13: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 865.357740] XFS (loop2): SB validate failed with error -117. [ 865.369088] XFS (loop5): unknown mount option [/dev/loop0]. 12:12:19 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r1, 0x8250aea6, &(0x7f0000000240)=""/171) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="21000000003a00fb034d564b000000819b"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3}) 12:12:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="58465342000b0000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:12:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534258800300000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:12:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="58465342c4001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 865.542071] XFS (loop0): Invalid superblock magic number 12:12:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) 12:12:19 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000100)) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0), 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040), 0x0, 0xfff) dup3(r1, r0, 0x0) [ 865.710984] XFS (loop2): SB sanity check failed [ 865.717666] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 865.729800] XFS (loop2): Unmount and run xfs_repair [ 865.736948] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 865.745765] 0000000041dc863d: 58 46 53 42 58 80 03 00 00 00 00 00 00 00 10 00 XFSBX........... [ 865.757992] 0000000074240ead: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 865.768078] XFS (loop5): SB sanity check failed [ 865.769571] 00000000d52fdc36: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 865.780996] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 865.784932] 0000000067ed9200: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 865.803615] XFS (loop1): SB sanity check failed [ 865.804005] 000000009a20d52b: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 865.808718] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 865.817733] 00000000f399cc3f: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 865.837728] XFS (loop1): Unmount and run xfs_repair [ 865.843665] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 865.885063] 000000004142dfc3: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 865.897388] 00000000c718ad08: 58 46 53 42 c4 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 865.899055] XFS (loop5): Unmount and run xfs_repair [ 865.916982] 000000005664a18f: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 865.926720] 000000004683d0ec: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 12:12:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x4001, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, &(0x7f0000000240)=""/123) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000000140)={0x2, 0x4, 0x6, 0x7, 0x0, 0x7}) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000080)=ANY=[@ANYBLOB="975497ffff00000000000001918833998a2cc336fa42f548c562ccc543e3d699f0563e867c8216e092debf0a915c1fb8c5e400ae98e395604c90dd82cd"]) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae9c, &(0x7f00000002c0)={0x4, 0x0, [0x8001, 0x8, 0x5]}) [ 865.938172] 0000000030d72847: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 865.948860] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 865.959619] XFS (loop2): SB validate failed with error -117. [ 865.969906] XFS (loop0): Invalid superblock magic number [ 865.978921] 000000002579611a: 58 46 53 42 00 0b 00 00 00 00 00 00 00 00 10 00 XFSB............ [ 865.983266] 000000003f908b92: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 866.025625] 0000000064555314: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 866.033031] 000000003cfcf378: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 866.049551] 000000006714e53f: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 866.082051] 00000000de33c823: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 866.082578] 00000000583ca5f8: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 866.111509] 00000000a45ccc33: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 866.111547] 000000003c457b3b: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 12:12:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 866.120829] 000000009afde808: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 866.151918] XFS (loop1): SB validate failed with error -117. [ 866.154051] 000000002443bc7f: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ 12:12:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534211001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 866.215821] 00000000618a6b8e: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 866.258043] 0000000008026a99: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 12:12:20 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) write(0xffffffffffffffff, &(0x7f00000011c0)="f1000000", 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 866.313207] XFS (loop5): SB validate failed with error -117. 12:12:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200091000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 866.424535] XFS (loop2): SB sanity check failed [ 866.429890] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 12:12:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000340)='/dev/snapshot\x00', 0x800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x6) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000080), &(0x7f0000000300)=0x2) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r5, 0x4008ae89, &(0x7f0000000440)=ANY=[@ANYBLOB="01000000001e00fb034d564b00000000053b7e20f778b06a552a27f2047cd1074e4a68b19dab89e3294337cb0c03706532362c1195356a836704f3a757d03c3023203198263384409a5549897cc689b62f5fa700f6c4ce61d0b786fe982caf3cb6f4eb77cf494b30d8b13e334842e65fcb85b030c842833e98d45464d7375739"]) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000040)={0x10003, 0x2, 0x3000, 0x1000, &(0x7f0000ff6000/0x1000)=nil}) syslog(0x9, &(0x7f0000000240)=""/191, 0xbf) ioctl$KVM_ENABLE_CAP_CPU(r5, 0x4008ae9c, &(0x7f00000001c0)={0x3}) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r2, 0xc0a85322, &(0x7f0000000380)) [ 866.497808] XFS (loop2): Unmount and run xfs_repair [ 866.543015] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 866.582156] 0000000055dba48f: 58 46 53 42 11 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 12:12:20 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000100)) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0), 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040), 0x0, 0xfff) dup3(r1, r0, 0x0) [ 866.619209] 000000008d42cf60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 866.644623] XFS (loop5): SB sanity check failed [ 866.649556] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 866.694261] 0000000007cee054: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 866.727987] XFS (loop5): Unmount and run xfs_repair [ 866.750405] 000000005906049e: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 866.772228] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 866.815765] 0000000090f75614: 58 46 53 42 00 09 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 866.825173] 0000000059690e36: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 866.850317] 00000000a2fc8699: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 866.859487] 000000002bbc40a2: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 866.869113] 00000000308d515e: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 866.878662] 00000000ebf540d4: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 866.885247] 000000006a7e4e57: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 866.888203] 00000000d0a6a2e4: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 866.906074] 00000000c7a69d9d: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 866.915724] 00000000527adc4f: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 866.925738] 000000006a08ba2d: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 866.935815] XFS (loop5): SB validate failed with error -117. [ 866.946101] 00000000156be0ba: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 866.958701] XFS (loop2): SB validate failed with error -117. 12:12:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f0000000140)={0x1}) [ 866.969480] XFS (loop0): Invalid superblock magic number 12:12:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="58465342001c1000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:12:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534222001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:12:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xedc0, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) 12:12:21 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) write(0xffffffffffffffff, &(0x7f00000011c0)="f1000000", 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 867.275896] XFS (loop5): SB sanity check failed [ 867.281035] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 867.309817] XFS (loop2): SB sanity check failed [ 867.314863] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 12:12:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000240)=ANY=[@ANYBLOB="01000000001e780c000000000000000001951ccfed2b753980c2a8cf3275211832221033a1e0e64d43003ea35b716396f758ceed4145b9b0fd8473590b5f6344b309adf5e8fc0b0a78b9112ba2e92799569b290bf29d9c65cfb53c8baf55fd032cfdec332eda227710e95d7fb26e5023d59bc5747a25a41aa6569a0cf3f9ad00d81e91e81edc14a2c4384b21e90f5a34a6ececb80bb8ba309fa6dedabd2d6dc6801d714f4017e1ea50e9ca8975afecd2eb98f553e12ce496bbee28c68f240ee759ed78470000000000000000000000"]) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000080)=0x7f) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae9c, &(0x7f00000001c0)={0x3}) [ 867.342985] XFS (loop5): Unmount and run xfs_repair [ 867.355367] XFS (loop2): Unmount and run xfs_repair [ 867.365127] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 867.390546] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 867.404348] 00000000478a2c23: 58 46 53 42 00 1c 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 867.415409] 0000000002cf8fe6: 58 46 53 42 22 00 10 00 00 00 00 00 00 00 10 00 XFSB"........... [ 867.424886] 00000000f3ca8e9a: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 867.457665] 00000000d4297111: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 867.481055] 000000002f8a686b: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 12:12:21 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000100)) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0), 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{}], 0x1, 0xfff) dup3(r1, r0, 0x0) 12:12:21 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x53a, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffd}]}) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) rt_sigpending(&(0x7f00000012c0), 0x8) write(0xffffffffffffffff, &(0x7f00000011c0)="f1000000", 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r2, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r3, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 867.510522] 000000003096397c: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 867.548812] 00000000b2ced123: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 867.599457] 00000000a4531a23: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 867.637886] 00000000c2083e99: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 867.677021] 000000002ac94a86: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 867.698735] 000000009a074ca7: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 867.719513] 0000000005855eec: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 867.721550] 000000002affdcde: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 867.729315] 000000006d3b6321: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 867.747258] XFS (loop5): SB validate failed with error -117. [ 867.800088] XFS (loop0): Invalid superblock magic number [ 867.811797] 00000000f848214f: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 867.824916] 00000000b49f98da: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 867.834324] XFS (loop2): SB validate failed with error -117. 12:12:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x2000000000404000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000080)="3e0f001fb9800000c00f3235000100000f300fd84acb0f01c90f20c035000000200f22c013fa0f01cb0f6a1500000000c4c121dea70800000066b8d0000f00d0"}], 0xaaaaaaaaaaaacc8, 0x0, &(0x7f0000000180)=[@vmwrite={0x8, 0x0, 0x3, 0x0, 0x0, 0x0, 0x6, 0x0, 0x7}], 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb0382564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3}) 12:12:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffff5, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) 12:12:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000382400000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:12:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000600000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:12:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534280031000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 868.162061] XFS (loop1): SB sanity check failed [ 868.167081] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 868.183733] XFS (loop5): SB sanity check failed [ 868.188576] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 12:12:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000be0001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3}) [ 868.237799] XFS (loop1): Unmount and run xfs_repair [ 868.249974] XFS (loop5): Unmount and run xfs_repair [ 868.262317] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 868.297319] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 868.328994] 00000000bd60530f: 58 46 53 42 00 00 03 82 40 00 00 00 00 00 10 00 XFSB....@....... [ 868.343105] 00000000447828c5: 58 46 53 42 00 00 06 00 00 00 00 00 00 00 10 00 XFSB............ [ 868.356621] XFS (loop2): SB sanity check failed [ 868.361468] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 868.379769] 000000005702bdc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 12:12:22 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000100)) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0), 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 868.409392] 0000000097311dbd: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 868.431530] XFS (loop2): Unmount and run xfs_repair [ 868.450001] 00000000cc76ab94: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 868.463603] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 868.477348] 00000000a928926a: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 868.506328] 0000000062485aa1: 58 46 53 42 80 03 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 868.510447] 0000000060a87350: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 868.528984] 00000000ef636498: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 868.556387] 000000001dad3d48: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 868.580240] 000000009377668d: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 868.583526] 000000006bc1960a: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 868.607487] 00000000ab3e2a3b: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 868.633059] 00000000af519e94: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 868.634264] 000000001f17afef: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 868.643261] 000000000a2bdd8d: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 868.678297] 00000000fd529475: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 868.689252] 00000000a910aff3: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 868.698631] 00000000420dae84: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 868.704914] 00000000344a49be: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 868.709144] 00000000b53156c3: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 868.725882] 000000009dffe72b: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 868.736786] XFS (loop1): SB validate failed with error -117. [ 868.738735] 0000000091931d02: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 868.746476] 00000000a0c0e3dc: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 868.762515] XFS (loop5): SB validate failed with error -117. 12:12:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x3, 0x800) accept$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000240)={r4, 0x1, 0x6, @remote}, 0x10) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x4) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r5, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r5, 0x4008ae9c, &(0x7f00000001c0)={0x3}) [ 868.783456] XFS (loop2): SB validate failed with error -117. 12:12:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200161000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 868.876898] XFS (loop0): Invalid superblock magic number 12:12:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001100000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:12:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:12:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6b6b6b00, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) 12:12:23 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3}) r4 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x6, 0x210100) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r4, &(0x7f0000000240)={0x15, 0x110, 0xfa00, {r5, 0x1000000000, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @rand_addr=0xf3}, @in6={0xa, 0x4e20, 0x5, @empty, 0x81}}}, 0x118) [ 869.133023] XFS (loop1): Mounting V4 Filesystem [ 869.154456] attempt to access beyond end of device [ 869.162480] loop1: rw=4096, want=2036888240641, limit=264192 [ 869.177353] XFS (loop2): SB sanity check failed [ 869.182821] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 869.197753] XFS (loop5): SB sanity check failed [ 869.203048] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 869.216669] XFS (loop1): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 869.245170] XFS (loop1): empty log check failed [ 869.251282] XFS (loop5): Unmount and run xfs_repair [ 869.257799] XFS (loop2): Unmount and run xfs_repair [ 869.264526] XFS (loop1): log mount/recovery failed: error -5 [ 869.273403] XFS (loop5): First 128 bytes of corrupted metadata buffer: 12:12:23 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000100)) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0), 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{}], 0x1, 0xfff) dup3(r1, r0, 0x0) [ 869.301313] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 869.337220] XFS (loop1): log mount failed [ 869.348701] 00000000e835cc5d: 58 46 53 42 00 00 11 00 00 00 00 00 00 00 10 00 XFSB............ [ 869.366693] 0000000027a883f4: 58 46 53 42 00 16 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 869.406330] 00000000b9f43412: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 869.429521] 0000000097676f37: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 869.473630] 0000000093b92bc8: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 869.488782] 000000007a1234f4: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 869.526578] 000000000f34c9d8: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 869.544115] 000000005d6c2426: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 869.566208] 00000000a7b4ef99: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 12:12:23 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(r1, 0x5607) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae9c, &(0x7f00000001c0)={0x3}) 12:12:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 869.591413] 0000000000596f42: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 869.615614] 0000000091d8727d: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 869.634972] 00000000333cd30a: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 869.651162] 000000004c5cdd1d: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 869.682888] 00000000d8196fb5: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 869.701740] 00000000944f2f70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 869.725869] 000000001ba4bb15: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 869.740858] XFS (loop5): SB validate failed with error -117. [ 869.764850] XFS (loop2): SB validate failed with error -117. 12:12:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534201601000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 869.929861] XFS (loop1): Mounting V4 Filesystem [ 869.945666] attempt to access beyond end of device [ 869.951233] loop1: rw=4096, want=2036888240641, limit=264192 [ 869.957658] XFS (loop1): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 869.960719] XFS (loop5): unknown mount option [/dev/loop0]. [ 869.967904] XFS (loop1): empty log check failed 12:12:23 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) getsockopt$sock_buf(r0, 0x1, 0x1f, &(0x7f0000000080)=""/16, &(0x7f0000000140)=0x10) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3}) 12:12:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6b6b6b00000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 869.980996] XFS (loop1): log mount/recovery failed: error -5 [ 870.022274] XFS (loop1): log mount failed [ 870.031683] XFS (loop2): SB sanity check failed [ 870.036634] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 870.048254] XFS (loop2): Unmount and run xfs_repair [ 870.053409] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 870.060299] 00000000cc3b3c0c: 58 46 53 42 01 60 10 00 00 00 00 00 00 00 10 00 XFSB.`.......... 12:12:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200231000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 870.069167] 000000009b98bac8: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 870.107530] 0000000023d53aaf: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 12:12:24 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000100)) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0), 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x0) dup3(r1, r0, 0x0) 12:12:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 870.176884] 00000000e500772e: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 870.237510] 000000006144465b: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 870.314187] 000000002c864f66: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 870.348558] 00000000cbf3b147: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... 12:12:24 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000100)) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0), 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x0) dup3(r1, r0, 0x0) [ 870.381932] 00000000cafb51f7: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 870.440214] XFS (loop5): SB sanity check failed [ 870.445148] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 870.457183] XFS (loop2): SB validate failed with error -117. [ 870.505108] XFS (loop5): Unmount and run xfs_repair 12:12:24 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000100)) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0), 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x0) dup3(r1, r0, 0x0) [ 870.527044] XFS (loop1): SB sanity check failed [ 870.538150] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 870.562353] XFS (loop5): First 128 bytes of corrupted metadata buffer: 12:12:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534207001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 870.611216] 00000000ec21b973: 58 46 53 42 00 23 10 00 00 00 00 00 00 00 10 00 XFSB.#.......... [ 870.632040] XFS (loop1): Unmount and run xfs_repair [ 870.661648] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 870.668002] 0000000070dc14f7: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 12:12:24 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) fsetxattr$security_ima(r2, &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@v1={0x2, "09c953ab566f5fc6"}, 0x9, 0x1) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3}) 12:12:24 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000100)) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0), 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(0xffffffffffffffff, r0, 0x0) [ 870.726972] 000000008aad8553: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 870.773611] 00000000e3d9e598: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 870.789987] 00000000ebe5fb2a: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 870.833907] 0000000086d2d0a2: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 870.865215] 0000000079744f61: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 870.884409] XFS (loop2): SB sanity check failed [ 870.889217] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 870.900618] XFS (loop2): Unmount and run xfs_repair [ 870.905893] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 870.913130] 00000000c51a5b8c: 58 46 53 42 07 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 870.922530] 0000000037e685f5: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 870.930079] 00000000547d4fb6: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 870.931951] 0000000082b6e5a8: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 870.931999] 00000000fbfb8440: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 870.932039] 00000000d4c574dd: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 870.932078] 00000000a2168900: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 870.932138] 000000006c6ea0d8: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 870.932449] 000000004c38433d: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 870.932648] XFS (loop2): SB validate failed with error -117. [ 870.938615] 00000000e8925b6e: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ 12:12:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2300, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 871.037373] 000000001be35f0b: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 871.044711] 000000004c0c0039: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... 12:12:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534254840300000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 871.103170] 00000000e3201d6d: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 871.117357] 000000003938a9bd: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 871.145678] 00000000031c9441: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 871.158134] XFS (loop5): SB validate failed with error -117. [ 871.205127] 000000000e6cacdf: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... 12:12:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200681000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 871.271324] 00000000a8d4e0c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 871.334832] XFS (loop1): SB validate failed with error -117. 12:12:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x200, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3}) [ 871.408432] XFS (loop2): SB sanity check failed [ 871.418683] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 12:12:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 871.519792] XFS (loop2): Unmount and run xfs_repair [ 871.525317] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 871.532809] 00000000a2319348: 58 46 53 42 54 84 03 00 00 00 00 00 00 00 10 00 XFSBT........... [ 871.541962] 000000006fd56938: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 871.571092] 000000003fb2d75a: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 871.580361] 000000007245cd19: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 871.589547] 00000000b1b32b31: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 871.598963] 00000000adff32b3: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 871.609951] 0000000008a18878: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 871.621095] 00000000292b7132: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 871.635137] XFS (loop2): SB validate failed with error -117. [ 871.654006] XFS (loop5): SB sanity check failed 12:12:25 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000100)) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) write(0xffffffffffffffff, &(0x7f00000011c0), 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000016c0), 0x0, 0x0) pipe(&(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xfff) dup3(r1, 0xffffffffffffffff, 0x0) [ 871.708577] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 12:12:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="584653425c840300000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 871.761440] XFS (loop0): Invalid superblock magic number [ 871.796481] XFS (loop5): Unmount and run xfs_repair 12:12:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) timer_create(0x6, &(0x7f0000000340)={0x0, 0x23, 0x4, @thr={&(0x7f0000000140)="b64599d4dece2f2250016213a8aac16f87ba110b42411ee7f7f8985f8f82b96a2b2046c49de8171b94d683afd046a7dc777e7d47886dd8987e5cdb8fa4a018c78ce625592484ae0e02f55c3d093d", &(0x7f0000000240)="53325745578ab58d17ada3885bc06fe299c7e557cade2ba1ed3d0c5836ee2d2b310bfd1a5ec54673f6fc61158702490b1e7bcafc3aae932eabd43b47888b670fe891a7dadb048c96095523e3ba761ce70be8285d523fcaf609092b715622688538162a6d031a37b117b5d7aabb732b8ccc8b5a84f9f4bd9700fe251749b77d98718bb1b81381eb00d97fd3268422f09de72f7048489bf5c864472f17a1837a2bf5be85a0a286e89b1e28741f4a3ce2e6e41f6026360bf6ede1fb1ca7427bcfe7ab326e54ccd2cba81494809b659aa9ee"}}, &(0x7f0000000380)=0x0) timer_gettime(r5, &(0x7f00000003c0)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae9c, &(0x7f00000001c0)={0x3}) 12:12:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x200000000000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 871.857066] XFS (loop1): Mounting V4 Filesystem [ 871.870522] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 871.919885] attempt to access beyond end of device [ 871.922560] 00000000150bf7d7: 58 46 53 42 00 68 10 00 00 00 00 00 00 00 10 00 XFSB.h.......... [ 871.953308] loop1: rw=4096, want=2036888240641, limit=264192 [ 871.994383] 00000000b1013487: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 871.995044] XFS (loop1): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 872.058772] XFS (loop1): empty log check failed [ 872.071413] XFS (loop1): log mount/recovery failed: error -5 [ 872.081074] 00000000f76a1cbd: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 872.115324] XFS (loop1): log mount failed [ 872.130588] 00000000afcd0676: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 872.143024] XFS (loop2): SB sanity check failed [ 872.147875] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 872.175178] 000000005c3c11f5: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 872.224880] 0000000039cbe1b7: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 872.254087] XFS (loop2): Unmount and run xfs_repair [ 872.276849] 0000000010862331: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 872.288265] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 872.325122] 00000000684f9e1f: 58 46 53 42 5c 84 03 00 00 00 00 00 00 00 10 00 XFSB\........... [ 872.343372] 000000008b3cc706: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 12:12:26 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)=0x0) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f0000000600)=[0xffffffffffffffff]) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getgid() lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)=0x0) setxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000880)={{}, {0x1, 0x4}, [{0x2, 0x2, r0}], {0x4, 0xd2f418677517440c}, [{0x8, 0x3, r1}, {0x8, 0x4, r2}, {0x8, 0x2, r3}, {0x8, 0x3, r4}, {0x8, 0x5, r5}, {0x8, 0x1, r6}, {0x8, 0x4, r7}, {0x8, 0x1, r8}, {0x8, 0x4, r9}], {0x10, 0x6}, {0x20, 0x4}}, 0x74, 0x0) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r11 = ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) r12 = ioctl$KVM_CREATE_VCPU(r11, 0xae41, 0x0) restart_syscall() write(r10, &(0x7f0000000900)="74b8440a4f2c8bfdb8909c613eea628012813fa762a40ee22528c0214222700d388a6f9a51a3604aa393b0977e15bf418c528c070942ca7228c2a66422c0ba03dce7ee8c16da4d6fb2b95647a3ac7af7701b2cd09a55dd312efee5eb01fb12f9f8dc5a673bf2bf", 0x67) syz_kvm_setup_cpu$x86(r11, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r12, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) r13 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/status\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r13, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [0x3]}) [ 872.384421] XFS (loop5): SB validate failed with error -117. [ 872.395107] 000000007502e7bb: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 12:12:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:12:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200061000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 872.461887] 00000000655f04b1: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 872.513927] 00000000400a39f0: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 872.540972] 000000002b03fd4c: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 872.551532] 000000001101f016: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 872.562538] 00000000b70be788: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 872.572622] 0000000089615d2d: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 872.587645] XFS (loop2): SB validate failed with error -117. [ 872.663081] XFS (loop5): SB sanity check failed [ 872.668002] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 12:12:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:12:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000004000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 872.782930] XFS (loop0): Invalid superblock magic number [ 872.821883] XFS (loop1): Mounting V4 Filesystem 12:12:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xb603000000000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 872.849347] XFS (loop5): Unmount and run xfs_repair [ 872.865847] attempt to access beyond end of device [ 872.889285] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 872.897245] loop1: rw=4096, want=2036888240641, limit=264192 [ 872.943219] XFS (loop1): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 872.955554] 00000000b292fdd0: 58 46 53 42 00 06 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 872.988807] 00000000c63d2ca0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 873.000583] XFS (loop1): empty log check failed 12:12:27 executing program 3: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe3000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x3c, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3}) [ 873.031594] XFS (loop4): Mounting V4 Filesystem [ 873.033313] XFS (loop1): log mount/recovery failed: error -5 [ 873.048350] 00000000650d4df1: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 873.085395] attempt to access beyond end of device [ 873.091805] XFS (loop1): log mount failed [ 873.117625] loop4: rw=4096, want=2036888240641, limit=264192 [ 873.125095] 000000007795916c: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 873.171101] XFS (loop4): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 873.178838] XFS (loop2): SB sanity check failed [ 873.192115] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 873.215579] 00000000cb7fce54: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 873.222411] XFS (loop4): empty log check failed [ 873.247519] XFS (loop4): log mount/recovery failed: error -5 [ 873.292801] 000000001617a583: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 873.295869] XFS (loop4): log mount failed [ 873.316097] XFS (loop2): Unmount and run xfs_repair [ 873.355378] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 873.389585] 000000002f3db2c5: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... 12:12:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 873.412283] 000000001ececb16: 58 46 53 42 00 00 00 04 00 00 00 00 00 00 10 00 XFSB............ 12:12:27 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3}) [ 873.465520] 00000000c3886e2e: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 873.493698] 0000000099d59cb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 12:12:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 873.552372] XFS (loop5): SB validate failed with error -117. [ 873.606674] 0000000048f7eff3: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 873.650279] 00000000e2bb716e: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 873.727149] XFS (loop1): Mounting V4 Filesystem 12:12:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000002000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 873.753360] 000000003a0b8056: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 873.807841] 00000000c4e6ed57: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 873.809464] attempt to access beyond end of device [ 873.819553] 00000000e16ae15a: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... 12:12:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf003, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 873.879361] XFS (loop4): Mounting V4 Filesystem [ 873.887253] loop1: rw=4096, want=2036888240641, limit=264192 [ 873.918299] 00000000e9e8706f: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 873.924955] attempt to access beyond end of device [ 873.934241] XFS (loop1): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 873.946862] loop4: rw=4096, want=2036888240641, limit=264192 [ 873.965649] XFS (loop5): unknown mount option [/dev/loop0]. [ 873.978662] XFS (loop1): empty log check failed [ 873.982543] XFS (loop4): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 873.987323] XFS (loop2): SB validate failed with error -117. [ 874.010103] XFS (loop1): log mount/recovery failed: error -5 [ 874.035012] XFS (loop1): log mount failed [ 874.047121] XFS (loop4): empty log check failed 12:12:28 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="010000f05e00001e00fb034d564aea9e45"]) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x4e22, 0x7fffffff, @mcast2, 0x2}, {0xa, 0x4e21, 0x1000, @remote, 0x7}, 0x8, [0x1, 0x2, 0x3, 0xfff, 0x80000001, 0x101, 0x3, 0x1f]}, 0x5c) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3}) 12:12:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="584653420d001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 874.088108] XFS (loop4): log mount/recovery failed: error -5 12:12:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000389240000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 874.155629] XFS (loop4): log mount failed 12:12:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 874.312850] XFS (loop5): unknown mount option [/dev/loop0]. 12:12:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 874.451056] XFS (loop2): SB sanity check failed [ 874.455910] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 12:12:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000c00000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:12:28 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='security.evm\x00', &(0x7f0000000180)=@ng={0x4, 0x3, "95b523e6e65abd6be3933e247af9cf93152af9"}, 0x15, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = dup3(r2, r4, 0x80000) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) write$P9_RREAD(r5, &(0x7f0000000300)={0xd, 0x75, 0x1, {0x324, "d751"}}, 0xfffffffffffffed9) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000240)=""/16, &(0x7f0000000280)=0x10) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000340)=ANY=[@ANYBLOB="f94b015371d0f461136289fa5d8a0ef21b0cba3c08b07a0d7c5c40dc9feb2343662f1e5559a871c477f0e38e44aa53c4dcb2783aa96b7a735a59d1d1976efdcb2a1c0ece5c2fe7996d9c637518a13bf8a57d7587f39e21d756b6e348cbdd962863ca6c040dd2a039cf720e88319d2f3ee9352d"]) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae9c, &(0x7f00000001c0)={0x3}) [ 874.553239] XFS (loop2): Unmount and run xfs_repair [ 874.609270] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 874.653551] XFS (loop1): Mounting V4 Filesystem [ 874.698962] XFS (loop5): unknown mount option [/dev/loop0]. [ 874.711210] 000000009289c34b: 58 46 53 42 0d 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 874.722978] attempt to access beyond end of device [ 874.763685] loop1: rw=4096, want=2036888240641, limit=264192 [ 874.794162] XFS (loop4): Mounting V4 Filesystem [ 874.814946] 000000007660b4ad: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 874.861224] attempt to access beyond end of device [ 874.865975] XFS (loop1): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 874.881641] loop4: rw=4096, want=2036888240641, limit=264192 [ 874.887899] XFS (loop4): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 874.899339] XFS (loop4): empty log check failed [ 874.904419] XFS (loop4): log mount/recovery failed: error -5 12:12:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x68, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 874.914660] XFS (loop4): log mount failed [ 874.932327] 0000000000fba8e9: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 874.960473] XFS (loop1): empty log check failed [ 874.965596] XFS (loop1): log mount/recovery failed: error -5 [ 874.974209] XFS (loop5): unknown mount option [/dev/loop0]. [ 874.975019] 000000002a36c2b8: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 874.993418] XFS (loop1): log mount failed [ 875.008126] 000000008cb39c75: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 12:12:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="58465342006c1000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 875.107503] 00000000602ffcdf: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ 12:12:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:12:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 875.169333] 00000000db862ea8: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 875.204257] 0000000030a0d2c9: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ 12:12:29 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_ONE_REG(r3, 0x4010aeac, &(0x7f0000000180)={0x3, 0x38000000}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="0100f800000e00fb034d564b092b738e01"]) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r4, 0x4004af61, &(0x7f0000000140)=0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3}) write(r3, &(0x7f0000000240)="23b60a21bcd0b9b126f7d983fbb72008c2eb55bdc1e446894a15bf7a69ba47e53a56f67b93bb910f689f244d66dd2740827bf8f7dae62f7b6c0a2d19c646ddd2394cefa610480871d3d5bf156665d633f1747dd690f1588975cf0b97a71bc83e06337eb505f15249d6c86990360abf7855aa9610a200feaee7e7", 0x7a) [ 875.224616] XFS (loop2): SB validate failed with error -117. 12:12:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="584653427c031000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 875.328829] XFS (loop0): Invalid superblock magic number [ 875.353273] XFS (loop1): unknown mount option [/dev/loop0]. [ 875.377866] XFS (loop4): Mounting V4 Filesystem [ 875.388552] XFS (loop5): SB sanity check failed [ 875.394187] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 875.427047] attempt to access beyond end of device [ 875.448800] loop4: rw=4096, want=2036888240641, limit=264192 12:12:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6da81154a2, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 875.479902] XFS (loop4): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 875.505090] XFS (loop4): empty log check failed [ 875.510063] XFS (loop4): log mount/recovery failed: error -5 12:12:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) [ 875.529049] XFS (loop4): log mount failed [ 875.532606] XFS (loop5): Unmount and run xfs_repair [ 875.568593] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 875.612418] 00000000ccab0d95: 58 46 53 42 00 6c 10 00 00 00 00 00 00 00 10 00 XFSB.l.......... [ 875.626304] XFS (loop2): SB sanity check failed [ 875.631730] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 875.644809] 00000000c0a57e9f: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 875.655102] XFS (loop2): Unmount and run xfs_repair [ 875.666348] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 875.687974] 00000000c50e6778: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 875.712882] 000000003eabae18: 58 46 53 42 7c 03 10 00 00 00 00 00 00 00 10 00 XFSB|........... 12:12:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 875.742891] 000000008246f194: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 875.787361] 00000000c8acf769: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 875.804108] XFS (loop1): Invalid superblock magic number [ 875.809926] 00000000298e681f: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 875.846131] 00000000234ea18a: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 12:12:29 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x480, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x40, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x4e22, 0x4, @empty, 0x2}, {0xa, 0x4e24, 0xd9f, @dev={0xfe, 0x80, [], 0x19}, 0x3a4d}, 0xffffffffffff0001, [0x4, 0x0, 0x3ff, 0x1e, 0x9, 0xe2a, 0x17, 0x5]}, 0x5c) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="0000010000"]) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae9c, &(0x7f00000001c0)={0x3}) [ 875.909050] 000000002793c3f8: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 875.947469] 000000009f808ab4: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ 12:12:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 876.002566] 000000000eda78f4: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 876.070759] XFS (loop4): Mounting V4 Filesystem [ 876.092571] 0000000010d5199f: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 876.122083] attempt to access beyond end of device [ 876.134963] 000000002f80fb42: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 876.161306] loop4: rw=4096, want=2036888240641, limit=264192 [ 876.179178] 00000000905dc379: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 876.224220] XFS (loop5): SB validate failed with error -117. [ 876.231138] XFS (loop4): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 876.282992] 00000000510d9d91: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 876.304788] XFS (loop1): Mounting V4 Filesystem [ 876.313630] XFS (loop4): empty log check failed [ 876.325377] attempt to access beyond end of device [ 876.328904] 00000000335effc9: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 876.334931] XFS (loop0): Invalid superblock magic number [ 876.341839] XFS (loop4): log mount/recovery failed: error -5 [ 876.345251] loop1: rw=4096, want=2036888240641, limit=264192 [ 876.356838] XFS (loop1): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 876.376155] XFS (loop2): SB validate failed with error -117. [ 876.393961] XFS (loop4): log mount failed [ 876.396822] XFS (loop1): empty log check failed [ 876.446794] XFS (loop1): log mount/recovery failed: error -5 12:12:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="584653420000037bcc0000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:12:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffff7f00000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) 12:12:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="58465342fa031000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 876.563393] XFS (loop1): log mount failed [ 876.607054] XFS (loop5): unknown mount option [/dev/loop0]. 12:12:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000e00000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:12:30 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r1, &(0x7f0000001000)=[{{&(0x7f0000000000)=@generic, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/52, 0x34}, {&(0x7f00000000c0)=""/169, 0xa9}, {&(0x7f0000000240)=""/137, 0x89}, {&(0x7f0000000180)=""/22, 0x16}], 0x4, &(0x7f0000000300)=""/224, 0xe0, 0x7}, 0x401}, {{&(0x7f0000000400)=@vsock, 0x80, &(0x7f0000000640)=[{&(0x7f0000000480)=""/201, 0xc9}, {&(0x7f0000000580)=""/105, 0x69}, {&(0x7f0000000600)=""/64, 0x40}], 0x3, &(0x7f0000000680)=""/60, 0x3c, 0x9}, 0x80000001}, {{&(0x7f0000000700), 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/40, 0x28}], 0x1, &(0x7f00000008c0)=""/119, 0x77, 0x1}, 0x1}, {{&(0x7f0000000940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000000c00)=[{&(0x7f00000009c0)=""/52, 0x34}, {&(0x7f0000000a00)=""/160, 0xa0}, {&(0x7f0000000ac0)=""/77, 0x4d}, {&(0x7f0000000b40)=""/119, 0x77}, {&(0x7f0000000bc0)=""/27, 0x1b}], 0x5, 0x0, 0x0, 0x7f}, 0x4}, {{&(0x7f0000000c80)=@sco, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000d00)=""/141, 0x8d}, {&(0x7f0000000dc0)=""/102, 0x66}, {&(0x7f0000000e40)=""/71, 0x47}, {&(0x7f0000000ec0)=""/112, 0x70}], 0x4, &(0x7f0000000f80)=""/79, 0x4f}, 0x1}], 0x5, 0x0, &(0x7f0000001140)={0x0, 0x989680}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x3, 0x0, 0x0, &(0x7f0000000800)}) 12:12:30 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000002001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3}) 12:12:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 876.814469] XFS (loop2): SB sanity check failed [ 876.819524] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 876.860004] XFS (loop5): unknown mount option [/dev/loop0]. [ 876.889382] XFS (loop2): Unmount and run xfs_repair [ 876.920971] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 876.934003] 00000000f7bf0093: 58 46 53 42 fa 03 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 876.949474] 000000009c35f1dd: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 12:12:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="58465342007a1000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 877.005034] 00000000240ca3a7: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 877.055135] XFS (loop1): Mounting V4 Filesystem [ 877.100931] 000000001d0a3c7d: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 877.111897] attempt to access beyond end of device [ 877.136562] loop1: rw=4096, want=2036888240641, limit=264192 12:12:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYRES16=r0, @ANYRESDEC=r3, @ANYPTR=&(0x7f0000000000)=ANY=[@ANYRESDEC=0x0, @ANYRES64=r2, @ANYRESDEC=r3], @ANYPTR64, @ANYRESDEC=r1]) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae9c, &(0x7f00000001c0)={0x3}) [ 877.169005] 00000000bf038172: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 877.197694] XFS (loop1): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 877.250533] 00000000f64024f0: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 877.259502] 000000001b6ec1d4: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 877.268641] XFS (loop1): empty log check failed [ 877.268680] XFS (loop1): log mount/recovery failed: error -5 [ 877.284461] XFS (loop1): log mount failed [ 877.324254] 00000000ed73dd15: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 877.345546] XFS (loop5): SB sanity check failed [ 877.351119] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 877.376154] XFS (loop2): SB validate failed with error -117. [ 877.391215] XFS (loop5): Unmount and run xfs_repair [ 877.404230] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 877.411544] 0000000047657242: 58 46 53 42 00 7a 10 00 00 00 00 00 00 00 10 00 XFSB.z.......... 12:12:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000080)=ANY=[@ANYBLOB="0120565c67f110632c000005001e00fb034d56d21000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f0000000140)={0x6}) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x7, 0x7fffffff}, &(0x7f0000000280)=0x90) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f00000002c0)={r5, 0xcf81, 0x7}, 0x8) [ 877.480669] 00000000e09d85a9: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 877.502703] 00000000b6905966: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 877.514329] 00000000da29dbe1: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 877.527739] 0000000096bec78b: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 877.540888] 00000000982aea10: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 877.549947] 00000000118f73c5: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... 12:12:31 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r1, &(0x7f0000001000)=[{{&(0x7f0000000000)=@generic, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/52, 0x34}, {&(0x7f00000000c0)=""/169, 0xa9}, {&(0x7f0000000240)=""/137, 0x89}, {&(0x7f0000000180)=""/22, 0x16}], 0x4, &(0x7f0000000300)=""/224, 0xe0, 0x7}, 0x401}, {{&(0x7f0000000400)=@vsock, 0x80, &(0x7f0000000640)=[{&(0x7f0000000480)=""/201, 0xc9}, {&(0x7f0000000580)=""/105, 0x69}, {&(0x7f0000000600)=""/64, 0x40}], 0x3, &(0x7f0000000680)=""/60, 0x3c, 0x9}, 0x80000001}, {{&(0x7f0000000700), 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/40, 0x28}], 0x1, &(0x7f00000008c0)=""/119, 0x77, 0x1}, 0x1}, {{&(0x7f0000000940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000000c00)=[{&(0x7f00000009c0)=""/52, 0x34}, {&(0x7f0000000a00)=""/160, 0xa0}, {&(0x7f0000000ac0)=""/77, 0x4d}, {&(0x7f0000000b40)=""/119, 0x77}, {&(0x7f0000000bc0)=""/27, 0x1b}], 0x5, 0x0, 0x0, 0x7f}, 0x4}, {{&(0x7f0000000c80)=@sco, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000d00)=""/141, 0x8d}, {&(0x7f0000000dc0)=""/102, 0x66}, {&(0x7f0000000e40)=""/71, 0x47}, {&(0x7f0000000ec0)=""/112, 0x70}], 0x4, &(0x7f0000000f80)=""/79, 0x4f}, 0x1}], 0x5, 0x0, &(0x7f0000001140)={0x0, 0x989680}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x3, 0x0, 0x0, &(0x7f0000000800)}) 12:12:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="58465342f0001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 877.580634] 00000000d1585283: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 877.595229] XFS (loop5): SB validate failed with error -117. [ 877.602248] XFS (loop0): Invalid superblock magic number 12:12:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:12:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1000000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) 12:12:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x10101, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='trusted.overlay.upper\x00', &(0x7f00000003c0)={0x0, 0xfb, 0x7b, 0x1, 0xfffffffffffffff7, "85e6a5661e5fb0eb82cc63e75e9e42ff", "1ed77481c6c8ce69cdf74398f9b90f349bf75ea96ef99603ed735dd9b32a8e7dd1486d8844e5c60a62002bc8a9a07c837cff34969b29f09bfda8a34f286ce8074c0d480420381d0b7ab8b9442f3bc30c0134ee57e818e1ab5f195747427dfa61ce7c2a112220"}, 0x7b, 0x1) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs_stats\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={r4, 0x10, &(0x7f0000000180)={&(0x7f0000000240)=""/148, 0x94, 0xffffffffffffffff}}, 0x10) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3}) 12:12:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200071000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 877.838843] XFS (loop2): SB sanity check failed [ 877.845798] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 877.933230] XFS (loop2): Unmount and run xfs_repair [ 877.980577] XFS (loop1): Mounting V4 Filesystem [ 877.987997] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 878.021040] attempt to access beyond end of device [ 878.032082] XFS (loop5): SB sanity check failed [ 878.036910] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 878.040092] loop1: rw=4096, want=2036888240641, limit=264192 [ 878.051780] 00000000021f2874: 58 46 53 42 f0 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 878.105981] XFS (loop1): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 878.128929] 000000001f5fe6c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 878.138969] XFS (loop5): Unmount and run xfs_repair [ 878.153195] XFS (loop1): empty log check failed [ 878.164347] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 878.177895] XFS (loop1): log mount/recovery failed: error -5 [ 878.189102] 00000000024251aa: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 878.210533] 000000007eb032a8: 58 46 53 42 00 07 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 878.215641] XFS (loop1): log mount failed [ 878.245506] 000000001c16389b: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 878.267962] 000000000aa940e8: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 878.283913] 00000000d3966f07: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 878.293607] 000000000dcc7791: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 878.302988] 00000000a4d5d313: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 878.313084] 00000000be2f2c8d: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 878.322633] XFS (loop2): SB validate failed with error -117. [ 878.351059] 0000000032d905d0: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 12:12:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x800, 0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x1}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3}) [ 878.370554] 000000009652156f: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ 12:12:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:12:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534217001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 878.428044] 0000000040e3f61e: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 12:12:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) [ 878.498625] 0000000028d70a2b: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 878.630277] 00000000b2a41546: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 878.669585] 00000000ee8b6ab6: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 12:12:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x48000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 878.680459] XFS (loop5): SB validate failed with error -117. [ 878.725956] XFS (loop4): Invalid superblock magic number [ 878.736871] XFS (loop2): SB sanity check failed [ 878.756898] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 878.806573] XFS (loop1): Mounting V4 Filesystem 12:12:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200ffff03000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:12:32 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x3, 0x3, 0x0, &(0x7f0000000800)}) [ 878.840598] XFS (loop2): Unmount and run xfs_repair [ 878.845894] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 878.866324] 00000000ad061362: 58 46 53 42 17 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 878.872832] attempt to access beyond end of device 12:12:32 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x103000, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000240)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe1000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000280)="0f070f6fae0040ba610066edb8f8008ed0ba4100ed0f01c90f20e3f30f2b78000fa5959900ba2100ec"}], 0x1, 0x0, &(0x7f00000002c0)=[@cstype0={0x4, 0x6}], 0xf898ee066e5e1f1) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) msgget(0x3, 0x48) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae9c, &(0x7f00000001c0)={0x3}) [ 878.920924] loop1: rw=4096, want=2036888240641, limit=264192 [ 878.947003] 00000000ae365c74: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 878.961466] XFS (loop1): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 12:12:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 879.020957] 00000000483a43ed: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 879.041034] XFS (loop1): empty log check failed [ 879.067601] XFS (loop1): log mount/recovery failed: error -5 [ 879.078760] 00000000ef94e3cb: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 879.115860] XFS (loop5): SB sanity check failed [ 879.122002] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 879.165015] XFS (loop1): log mount failed [ 879.182366] 00000000526e3d29: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 879.197870] XFS (loop4): unknown mount option [/dev/loop0]. [ 879.236879] XFS (loop5): Unmount and run xfs_repair [ 879.243099] 00000000f24ecaf1: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 879.270535] XFS (loop5): First 128 bytes of corrupted metadata buffer: 12:12:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 879.347242] 0000000076de1e33: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 879.376094] 00000000dbe70d01: 58 46 53 42 00 ff ff 03 00 00 00 00 00 00 10 00 XFSB............ 12:12:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 879.408720] 00000000e30f3f7f: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 879.430846] 00000000ec57bde3: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 12:12:33 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x10002, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000140)={0x7, 0x0, [{0xbc1, 0x0, 0x3}, {0xa96}, {0x409, 0x0, 0x1}, {0xf7b}, {0x9ab, 0x0, 0x80000001}, {0x2bd, 0x0, 0x8}, {0x4b564fff, 0x0, 0xdb10}]}) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3}) [ 879.492453] XFS (loop2): SB validate failed with error -117. [ 879.503786] 0000000065384074: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 879.576090] XFS (loop4): Mounting V4 Filesystem 12:12:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="584653420f001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 879.616829] 0000000050e102d1: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ 12:12:33 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet6(r1, 0x0, &(0x7f0000000140), 0x80000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae9c, &(0x7f00000001c0)={0x3}) [ 879.665317] attempt to access beyond end of device [ 879.684584] loop4: rw=4096, want=2036888240641, limit=264192 [ 879.713446] 00000000230b674a: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 879.766280] XFS (loop1): Mounting V4 Filesystem [ 879.767189] XFS (loop4): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 879.782789] XFS (loop4): empty log check failed [ 879.787690] XFS (loop4): log mount/recovery failed: error -5 [ 879.797779] XFS (loop4): log mount failed [ 879.804512] attempt to access beyond end of device [ 879.809647] loop1: rw=4096, want=2036888240641, limit=264192 12:12:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7202, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 879.857055] 000000002be576ca: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 879.870433] 00000000a7778fbd: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 879.884392] XFS (loop1): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 879.908077] 000000001c747079: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 879.929248] XFS (loop2): SB sanity check failed [ 879.944130] XFS (loop1): empty log check failed 12:12:33 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') socket$packet(0x11, 0x0, 0x300) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x3, 0x0, 0x0, &(0x7f0000000800)}) [ 879.945429] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 879.961342] XFS (loop1): log mount/recovery failed: error -5 [ 879.982604] XFS (loop5): SB validate failed with error -117. [ 880.000802] XFS (loop1): log mount failed [ 880.042952] XFS (loop2): Unmount and run xfs_repair [ 880.060376] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 880.079340] 0000000055c40d71: 58 46 53 42 0f 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 12:12:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000372380000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:12:34 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)=0x0) capset(&(0x7f0000000140)={0x20071026, r5}, &(0x7f0000000180)={0x3, 0xfea0, 0x4d6b, 0x9, 0xfffffffffffffbff, 0x93d}) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000041711f23cbcb4"]) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae9c, &(0x7f00000001c0)={0x3}) 12:12:34 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') socket$packet(0x11, 0x0, 0x300) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x3, 0x0, 0x0, &(0x7f0000000800)}) [ 880.181932] 00000000d3af8b5c: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 880.239619] 00000000845ed41b: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 880.283044] 000000007c2c8c88: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ 12:12:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) [ 880.323662] 0000000032b5bcb4: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 880.364215] 00000000468ba00e: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 880.403838] capability: warning: `syz-executor3' uses deprecated v2 capabilities in a way that may be insecure 12:12:34 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') socket$packet(0x11, 0x0, 0x300) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x3, 0x0, 0x0, &(0x7f0000000800)}) [ 880.404603] 0000000038bfeb84: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 880.492937] XFS (loop5): SB sanity check failed [ 880.498867] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 880.526929] XFS (loop5): Unmount and run xfs_repair [ 880.532328] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 880.539115] 00000000d6674b2a: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 880.554751] 000000005a25cfb7: 58 46 53 42 00 00 03 72 38 00 00 00 00 00 10 00 XFSB...r8....... [ 880.570782] XFS (loop2): SB validate failed with error -117. [ 880.579509] 000000009fe71005: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 12:12:34 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x3, 0x0, 0x0, &(0x7f0000000800)}) [ 880.588779] 00000000983b6dd1: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 880.606575] 000000004a9d6371: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 880.616543] 0000000043568684: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 12:12:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534212001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 880.649759] XFS (loop1): Invalid superblock magic number [ 880.657716] 000000000a390d82: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 880.684728] 00000000cde72f4c: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... 12:12:34 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x3, 0x0, 0x0, &(0x7f0000000800)}) [ 880.715055] 000000002146a036: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 880.749688] XFS (loop5): SB validate failed with error -117. [ 880.756239] XFS (loop0): Invalid superblock magic number 12:12:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:12:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x989680, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) 12:12:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000387180000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:12:34 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x3, 0x0, 0x0, &(0x7f0000000800)}) 12:12:34 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x480, 0x0) getsockopt$inet_opts(r3, 0x0, 0x4, &(0x7f0000000140), &(0x7f0000000180)) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae9c, &(0x7f00000001c0)={0x3}) [ 881.008098] XFS (loop2): SB sanity check failed [ 881.013159] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 881.027926] XFS (loop2): Unmount and run xfs_repair [ 881.041134] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 881.084717] XFS (loop1): Mounting V4 Filesystem [ 881.091148] XFS (loop5): SB sanity check failed [ 881.096078] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 881.107378] 00000000db7f46b6: 58 46 53 42 12 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 881.109834] XFS (loop5): Unmount and run xfs_repair 12:12:35 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x3, 0x0, 0x0, &(0x7f0000000800)}) [ 881.133276] attempt to access beyond end of device [ 881.157324] loop1: rw=4096, want=2036888240641, limit=264192 [ 881.167903] 00000000237c0a96: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 881.196886] XFS (loop1): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 881.220224] 00000000280fab05: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 881.237487] XFS (loop5): First 128 bytes of corrupted metadata buffer: 12:12:35 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x3, 0x0, 0x0, &(0x7f0000000800)}) [ 881.261837] XFS (loop1): empty log check failed [ 881.268313] 00000000a5f17fb1: 58 46 53 42 00 00 03 87 18 00 00 00 00 00 10 00 XFSB............ [ 881.279365] 000000004d0d1be5: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 881.303606] XFS (loop1): log mount/recovery failed: error -5 [ 881.322822] 000000006528925c: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 881.350694] XFS (loop1): log mount failed [ 881.356424] 000000002ca71f36: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 881.367750] 000000003d7d3e9f: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ 12:12:35 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x3, 0x0, 0x0, &(0x7f0000000800)}) [ 881.411003] 00000000c4812143: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 881.417272] 0000000020d894be: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 881.454757] 00000000231736f1: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 881.499750] XFS (loop2): SB validate failed with error -117. [ 881.513946] 000000001e89d1f1: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 881.547560] 0000000007b34b7a: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 881.556898] 00000000ba8ad749: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ 12:12:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="58465342002c1000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:12:35 executing program 4: sysinfo(&(0x7f00000007c0)=""/154) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000006c0)={0x3, 0x0, 0x0, &(0x7f0000000800)}) [ 881.599260] 00000000253cd4cd: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 881.647184] 000000007c8865d3: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 881.700349] XFS (loop5): SB validate failed with error -117. [ 881.734357] XFS (loop0): Invalid superblock magic number 12:12:35 executing program 4: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000006c0)={0x3, 0x0, 0x0, &(0x7f0000000800)}) 12:12:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:12:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001200000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:12:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffff00000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 881.893788] XFS (loop2): SB sanity check failed [ 881.898692] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 12:12:35 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x0, 0x0, 0x0, &(0x7f0000000800)}) [ 881.952429] XFS (loop2): Unmount and run xfs_repair [ 881.978561] XFS (loop2): First 128 bytes of corrupted metadata buffer: 12:12:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xfffffffffffffa96, 0x10000) ioctl$KDGETKEYCODE(r3, 0x4b4c, &(0x7f0000000140)={0x10001, 0xbeb}) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae9c, &(0x7f00000001c0)={0x3}) [ 882.021597] 00000000cefb5e20: 58 46 53 42 00 2c 10 00 00 00 00 00 00 00 10 00 XFSB.,.......... 12:12:36 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x3, 0x0, 0x0, &(0x7f0000000800)}) [ 882.092169] 000000007e498e47: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 882.117004] XFS (loop5): SB sanity check failed [ 882.122159] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 882.167646] 00000000d77382c2: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 882.168739] XFS (loop1): Mounting V4 Filesystem [ 882.209212] 00000000b354841d: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 882.212643] XFS (loop5): Unmount and run xfs_repair 12:12:36 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x3, 0x0, 0x0, &(0x7f0000000800)}) [ 882.257062] 00000000edd3bba4: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 882.303344] 00000000690c359a: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 882.325952] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 882.344044] attempt to access beyond end of device 12:12:36 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x3, 0x0, 0x0, &(0x7f0000000800)}) [ 882.351038] 000000000356ec26: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 882.380385] loop1: rw=4096, want=2036888240641, limit=264192 [ 882.386580] 00000000f15eef99: 58 46 53 42 00 00 12 00 00 00 00 00 00 00 10 00 XFSB............ 12:12:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x100, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x42, 0x100) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e4890c5ce1f00fb034d564b"]) ppoll(&(0x7f0000000080)=[{r2, 0x240}, {r2, 0x10}, {r4}, {r3, 0x640}], 0x4, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000380)={0x4}, 0x8) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae9c, &(0x7f00000001c0)={0x3, 0x0, [0x8000000000000000, 0xfffffffffffffffa]}) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f0000000340)={0x0, 0x2, 0xfffffffffffffffd, 0x4, 0x20}) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x88000, 0x0) r6 = accept4$inet6(r5, &(0x7f0000000400)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000480)=0xb89ceca7483af60c, 0x80800) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000300)=0x14) [ 882.433260] 00000000329748b1: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 882.465402] XFS (loop1): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 882.509264] 00000000c2269cf9: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 882.536319] 000000009bb90bb8: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 882.545855] XFS (loop1): empty log check failed [ 882.551839] XFS (loop2): SB validate failed with error -117. [ 882.560387] 00000000414a9ac4: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 882.572268] 000000002d9f4cca: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 882.582310] XFS (loop1): log mount/recovery failed: error -5 [ 882.600505] XFS (loop1): log mount failed [ 882.605092] 0000000020768abc: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ 12:12:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="58465342000a1000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:12:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 882.651151] 000000009eac9149: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 882.683050] XFS (loop0): Invalid superblock magic number [ 882.709885] 00000000b052ca1d: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 12:12:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="58465342002c1000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 882.752578] XFS (loop5): SB validate failed with error -117. 12:12:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xc400000000000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) 12:12:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000c00000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:12:36 executing program 3: socketpair$unix(0x1, 0x2007, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3}) [ 882.894945] XFS (loop4): Mounting V4 Filesystem [ 882.992473] XFS (loop2): SB sanity check failed [ 882.997369] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 883.028349] attempt to access beyond end of device [ 883.081058] loop4: rw=4096, want=2036888240641, limit=264192 [ 883.112134] XFS (loop2): Unmount and run xfs_repair [ 883.131279] XFS (loop4): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 883.157622] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 883.171414] XFS (loop5): SB sanity check failed [ 883.176359] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 883.216498] XFS (loop4): empty log check failed [ 883.222766] 00000000c13d9a89: 58 46 53 42 00 0a 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 883.246355] XFS (loop5): Unmount and run xfs_repair [ 883.253267] XFS (loop4): log mount/recovery failed: error -5 [ 883.272782] 00000000462e1d60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 883.286711] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 883.305309] XFS (loop4): log mount failed [ 883.332556] 000000000ea971d7: 58 46 53 42 00 00 0c 00 00 00 00 00 00 00 10 00 XFSB............ [ 883.367567] 000000004f87081f: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 883.400341] 000000002d9ee135: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 883.416981] 00000000355290f6: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 883.431057] 00000000a7a441ea: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 883.440054] 00000000ed2b07c0: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 883.452919] 00000000d6b31c63: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 883.462099] 0000000048061130: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 883.472576] 0000000048e358d5: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 883.475996] 0000000089fdd8e2: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 883.481643] 00000000882072d5: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 883.501060] XFS (loop5): SB validate failed with error -117. [ 883.532002] 00000000906bb924: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 883.546682] 00000000165ce6b8: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 883.558968] 0000000027175308: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 883.572264] XFS (loop2): SB validate failed with error -117. [ 883.581320] XFS (loop1): SB sanity check failed [ 883.586188] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 12:12:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 883.597840] XFS (loop0): Invalid superblock magic number [ 883.599826] XFS (loop1): Unmount and run xfs_repair [ 883.615396] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 883.622557] 000000009ceaf6b5: 58 46 53 42 00 2c 10 00 00 00 00 00 00 00 10 00 XFSB.,.......... [ 883.632062] 000000000bd4c1f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 883.643047] 00000000753ee3ec: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 12:12:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200191000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 883.652499] 00000000337564dd: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 883.661854] 000000003ae13b7f: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 883.671849] 000000005e3e67ea: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 883.691674] 00000000f4e3ca11: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 883.701255] 000000002ee6caf6: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ 12:12:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000401000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 883.765216] XFS (loop1): SB validate failed with error -117. 12:12:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5200000000000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) 12:12:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:12:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000140)=ANY=[@ANYBLOB="01d01a4cada21805ec6e1588ab1c7b3b0438e5f0d6f4ec71380800000000000000f7cff86005623d412d46de6097c1466854ecf2c4d69e296bcc934d09e4a868a909d098c1307a701f04dc59e2af8a0c906ac382377792c90e1fc5ed7bf8dcec067126e694e4a916d3eded4afcbd6a"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3}) [ 883.982152] XFS (loop4): Mounting V4 Filesystem [ 884.000291] XFS (loop2): SB sanity check failed [ 884.006868] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 884.054010] attempt to access beyond end of device [ 884.054096] XFS (loop2): Unmount and run xfs_repair [ 884.100104] loop4: rw=4096, want=2036888240641, limit=264192 [ 884.123272] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 884.132838] XFS (loop4): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 884.153049] XFS (loop5): SB sanity check failed [ 884.158073] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 884.191686] 00000000fa6e78b6: 58 46 53 42 00 19 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 884.209087] XFS (loop4): empty log check failed [ 884.218380] XFS (loop5): Unmount and run xfs_repair [ 884.235489] XFS (loop1): SB sanity check failed [ 884.246388] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 884.258111] XFS (loop4): log mount/recovery failed: error -5 [ 884.267579] 0000000000ca205f: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 884.279392] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 884.297264] XFS (loop4): log mount failed [ 884.307823] 000000008ec0b98c: 58 46 53 42 00 00 04 01 00 00 00 00 00 00 10 00 XFSB............ [ 884.318628] 00000000c2d96892: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 884.331246] XFS (loop1): Unmount and run xfs_repair [ 884.363689] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 884.370978] 000000003d7f2769: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 884.380425] 0000000066cb903f: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 884.394159] 00000000c4541f77: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 884.495393] 000000009d9cff4d: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 884.543193] 00000000c8c1ca55: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 884.552545] 00000000b954e7f6: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 884.586267] 000000004252044c: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 884.596915] 0000000054ba69d8: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 884.606342] 0000000008f465f5: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 884.615784] 0000000066a0ade0: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 884.626206] 000000005b3e27b9: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 12:12:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 884.635481] 00000000695990ea: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 884.659207] 000000008dd6a6e6: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 884.670958] XFS (loop5): SB validate failed with error -117. [ 884.680421] 000000003225904b: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 884.690264] 00000000f77b8997: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 884.702399] 00000000b86a1856: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ 12:12:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x3, 0x8000) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000500)={0x4, 0x186, "1b6f4023c27885c6a863ba010a42d9ed4ad05eb1118d5ef8d90626f70e5ed30def5ef2ea14e0c416a82380c1807b17a5251a79a0b9fdf001afb0ee50c02ef331b80613bd03c6e17658fe20609ad2dfc2c0f11d436e7bae76f3894cd45234092752af7bf673ad6059b1c6380c2a600953da25699daa812d69f6889fd00d11d7da402b7a64a8d971718aef352c1ba383a9b791f10af9d19f8a687061d3ad5a35462691dd157d6bf96d188dfce5cad1a031c688a3413a2737c07f08947953ec053f32b31329a802696d75d907eb9a853bfa20f19effffffff0000000026ee38f6600224be2400000000935c35673fe16b9e42b52ae8de7feb007eddb3e575704b66c107db611cd8f1c7452b5a004bc7f1e39d5f3bff0dc7b048b2de0ccc5846c841a7538a239ed48298b77a51433556121829d7c64252397ad6fd1c5fb1fff1e1444e85b5cb24c961a57d01939b402b1cd4157b296491d5452385d739e012b1e2a693df3d8fbc6caeb9662cd3af99f0b3dfc403a355c543d6c5bd161166d6e0d4ec47e20db8990b"}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r5, 0xc0105303, &(0x7f0000000140)={0x9, 0xffffffffffff4857, 0x307}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae9c, &(0x7f00000001c0)={0x3}) [ 884.750493] 00000000ceda168e: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 884.761752] XFS (loop2): SB validate failed with error -117. 12:12:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000800000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:12:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x23, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 884.800575] 00000000e929ed49: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 884.815940] 0000000081b59053: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... 12:12:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534204000000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 884.875076] 000000003cae32d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 884.906366] XFS (loop1): SB validate failed with error -117. 12:12:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x5, 0x101002) getsockopt$bt_l2cap_L2CAP_OPTIONS(r5, 0x6, 0x1, &(0x7f0000000240), &(0x7f0000000280)=0xc) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae9c, &(0x7f00000001c0)={0x3}) fstatfs(r0, &(0x7f0000000140)=""/110) [ 884.992456] XFS (loop4): Mounting V4 Filesystem 12:12:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200191000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 885.043984] attempt to access beyond end of device [ 885.077856] XFS (loop5): SB sanity check failed [ 885.085544] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 885.086373] loop4: rw=4096, want=2036888240641, limit=264192 [ 885.122748] XFS (loop5): Unmount and run xfs_repair [ 885.123897] XFS (loop4): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 885.150034] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 885.171528] XFS (loop4): empty log check failed [ 885.179399] XFS (loop4): log mount/recovery failed: error -5 [ 885.190402] 0000000064f31984: 58 46 53 42 00 00 08 00 00 00 00 00 00 00 10 00 XFSB............ [ 885.205857] XFS (loop0): Invalid superblock magic number [ 885.213068] XFS (loop4): log mount failed [ 885.228884] XFS (loop2): SB sanity check failed [ 885.245460] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 885.248801] 000000000f6018a4: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 885.282265] 0000000052515edb: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 885.282805] XFS (loop2): Unmount and run xfs_repair [ 885.293597] 000000001b39011d: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 885.333864] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 885.375036] 00000000cf442f1f: 58 46 53 42 04 00 00 00 00 00 00 00 00 00 10 00 XFSB............ [ 885.380707] 00000000262d8df1: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 885.389894] XFS (loop1): SB sanity check failed [ 885.405072] XFS (loop1): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 885.407344] 00000000e8091caa: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 885.418704] 00000000669ed246: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 885.430089] 00000000cb76911d: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 885.453273] XFS (loop1): Unmount and run xfs_repair [ 885.458423] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 885.466164] 000000002d5f10fd: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 12:12:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf003000000000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 885.475205] 00000000684f9e1f: 58 46 53 42 00 19 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 885.484389] 00000000eb2c8461: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 885.507246] 000000007502e7bb: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 885.530259] 00000000171e798a: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 885.539293] 0000000078b57f8d: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 885.548645] 000000002e3509ac: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 885.560364] 00000000655f04b1: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 885.569341] 00000000400a39f0: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 885.581335] XFS (loop5): SB validate failed with error -117. [ 885.621104] 000000004f4386b6: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 885.629999] 00000000cde532c3: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 885.652681] 000000002b03fd4c: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 885.663787] 000000001101f016: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ 12:12:39 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000140)={0x14, 0x49, 0x2, {0x80, 0x0, 0x1}}, 0x14) write$P9_RLERROR(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000007010002006c6fc445720904bbd89930f1ba34c934bd52b891954c8a83407aca5e5820f8438308db332460d0fb8dd1b6d7155e9ceedc5fbebe088b7dcf31a015fe118b080273f1418f82032196453e40222a85b88aa70987c00dbeb6ac75dcb3a5299f24f6db3b7238c265e2358178c14dc1d6c88aca13a1be0ad412d3d3dfcd8cac89f1628fb2546384b9758fcbd1"], 0xb) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000340)={0xf, 0x8, 0xfa00, {r3, 0x1f}}, 0x10) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae9c, &(0x7f00000001c0)={0x3}) [ 885.675318] 00000000b70be788: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 885.686899] 0000000089615d2d: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 885.703769] XFS (loop1): SB validate failed with error -117. [ 885.722264] XFS (loop2): SB validate failed with error -117. 12:12:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:12:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000300000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:12:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200c41000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 886.042188] XFS (loop5): unknown mount option [/dev/loop0]. 12:12:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:12:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000640)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000680)={0x0, 0x3}, &(0x7f00000006c0)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000700)={r3, 0x9, 0x20, 0x1000, 0x80, 0x1ff}, 0x14) r4 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r5, 0x4008ae89, &(0x7f0000000140)=ANY=[@ANYBLOB="01000000001e00fb034d564b000000000170102c660855df7c2a4bb79dd9200e6d03a073f824b59275eb7991836ba398ff86fbd8d0dcff6c1a83c156163b80ff72ae95148d441a9489186fde54373f938d6cc94e242302e2bfa21a3a56f4a79cfe9073ab2a82d3050ffba5b1a0336770ec1e4b0f84d5200a9dc0f6c4c29e1b45"]) ioctl$KVM_ENABLE_CAP_CPU(r5, 0x4008ae9c, &(0x7f00000001c0)={0x3}) [ 886.128898] XFS (loop5): unknown mount option [/dev/loop0]. [ 886.136233] XFS (loop0): Invalid superblock magic number [ 886.177152] XFS (loop4): Mounting V4 Filesystem 12:12:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000600000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 886.237491] XFS (loop2): SB sanity check failed [ 886.255758] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 12:12:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4c000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 886.300087] attempt to access beyond end of device [ 886.306091] loop4: rw=4096, want=2036888240641, limit=264192 [ 886.315494] XFS (loop4): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 886.337302] XFS (loop2): Unmount and run xfs_repair [ 886.352234] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 886.362507] XFS (loop4): empty log check failed [ 886.369788] 0000000089ea1f0d: 58 46 53 42 00 c4 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 886.382024] XFS (loop4): log mount/recovery failed: error -5 [ 886.405786] XFS (loop1): Mounting V4 Filesystem [ 886.423030] 0000000083c47683: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 886.434603] XFS (loop4): log mount failed [ 886.462293] attempt to access beyond end of device [ 886.469608] loop1: rw=4096, want=2036888240641, limit=264192 [ 886.485529] XFS (loop1): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 886.513797] XFS (loop5): unknown mount option [/dev/loop0]. [ 886.530288] 000000005b80b792: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 886.551543] XFS (loop1): empty log check failed 12:12:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 886.574423] 000000008736cab9: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 886.590249] XFS (loop1): log mount/recovery failed: error -5 [ 886.610461] XFS (loop1): log mount failed [ 886.620345] 00000000a301f379: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 12:12:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000900000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:12:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = fcntl$getown(r0, 0x9) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000080)=r1) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae9c, &(0x7f00000001c0)={0x3}) [ 886.654919] 000000009fd25dd1: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 886.665995] 00000000d3df81b5: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 886.678049] 000000005648af84: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 886.696803] XFS (loop2): SB validate failed with error -117. 12:12:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:12:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534216001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 886.835845] XFS (loop0): Invalid superblock magic number [ 886.934947] XFS (loop4): Mounting V4 Filesystem 12:12:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x20000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 886.994078] attempt to access beyond end of device [ 887.008399] XFS (loop5): SB sanity check failed [ 887.013795] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 887.031435] loop4: rw=4096, want=2036888240641, limit=264192 [ 887.053268] XFS (loop5): Unmount and run xfs_repair [ 887.062101] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 887.077764] XFS (loop4): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 887.099568] 000000003ae9cc3f: 58 46 53 42 00 00 09 00 00 00 00 00 00 00 10 00 XFSB............ [ 887.107569] XFS (loop4): empty log check failed [ 887.133764] XFS (loop4): log mount/recovery failed: error -5 12:12:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x8001, 0x400) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f0000000240)={0x8, 0x120, 0xfa00, {0x2, {0x9, 0x1, "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", 0xcb, 0x0, 0x3, 0xffffffff00000001, 0x5103, 0x1ff, 0x200, 0x1}, r4}}, 0x128) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r5, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000001070000000012fb0c3a91b502c6"]) ioctl$KVM_ENABLE_CAP_CPU(r5, 0x4008ae9c, &(0x7f00000001c0)={0x3}) lseek(r5, 0x0, 0x0) [ 887.166825] 00000000fb1c1c81: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 887.179606] XFS (loop4): log mount failed [ 887.215821] XFS (loop2): SB sanity check failed [ 887.238000] XFS (loop1): Mounting V4 Filesystem [ 887.244691] 00000000142932e1: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 887.246206] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 887.313243] 000000001451ec3a: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 887.328906] attempt to access beyond end of device [ 887.365336] 000000006a65d0ad: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 887.382092] loop1: rw=4096, want=2036888240641, limit=264192 [ 887.412879] 00000000102888c7: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 887.431035] XFS (loop1): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 887.457481] XFS (loop2): Unmount and run xfs_repair [ 887.464528] 000000001ae4d5ea: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 887.492914] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 887.506534] XFS (loop1): empty log check failed 12:12:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 887.507160] 000000003ec17cc1: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 887.531197] XFS (loop1): log mount/recovery failed: error -5 [ 887.540704] 00000000b9439de3: 58 46 53 42 16 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 887.592135] XFS (loop5): SB validate failed with error -117. [ 887.592219] XFS (loop1): log mount failed [ 887.647911] 00000000dad59c9a: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 887.675768] 000000003f3a2371: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 12:12:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000a00000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 887.787329] 00000000d7c768f7: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 887.817238] 0000000083f8f906: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 12:12:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000000000fb034dc94b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3}) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x86802, 0x0) mkdirat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x1ff) 12:12:41 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x3, 0x0, 0x0, &(0x7f0000000800)}) [ 887.839961] 0000000017694a11: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 887.859538] 000000004a3bf388: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 887.915018] 00000000c174bcec: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 887.940867] XFS (loop2): SB validate failed with error -117. [ 887.942352] XFS (loop4): Mounting V4 Filesystem 12:12:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xc0ed0000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) 12:12:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:12:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534280021000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 888.056801] attempt to access beyond end of device [ 888.075532] loop4: rw=4096, want=2036888240641, limit=264192 [ 888.136977] XFS (loop4): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 888.151763] XFS (loop5): SB sanity check failed [ 888.157181] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 888.212775] XFS (loop4): empty log check failed [ 888.240442] XFS (loop4): log mount/recovery failed: error -5 [ 888.279533] XFS (loop5): Unmount and run xfs_repair [ 888.289243] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 888.298164] XFS (loop4): log mount failed [ 888.333146] 00000000bddd10ca: 58 46 53 42 00 00 0a 00 00 00 00 00 00 00 10 00 XFSB............ [ 888.379179] XFS (loop2): SB sanity check failed [ 888.386687] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 888.410865] XFS (loop1): Mounting V4 Filesystem [ 888.438501] 000000001d282ba8: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 888.467857] attempt to access beyond end of device [ 888.476916] XFS (loop2): Unmount and run xfs_repair [ 888.489118] loop1: rw=4096, want=2036888240641, limit=264192 [ 888.491106] 0000000023534074: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 888.518413] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 888.518839] XFS (loop1): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 888.535592] XFS (loop1): empty log check failed [ 888.540676] XFS (loop1): log mount/recovery failed: error -5 [ 888.549648] XFS (loop1): log mount failed [ 888.554309] 0000000034b4a85d: 58 46 53 42 80 02 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 888.565637] 00000000fc0004e1: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 888.584430] 0000000098532376: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 888.593692] 00000000d2234efc: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 888.595693] 000000001ed95e85: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 888.612609] 00000000f75a8094: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 888.628466] 000000000c9ebddb: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 888.637666] 000000006215f06d: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 888.648805] 00000000343373c5: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 888.661115] XFS (loop2): SB validate failed with error -117. [ 888.719145] 00000000a29790a6: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 888.762171] 000000009f31132c: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 888.800339] 00000000a63889e1: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 888.819730] 000000001735de9e: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 888.847263] XFS (loop5): SB validate failed with error -117. 12:12:42 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x8001, 0x0) connect$pppoe(r0, &(0x7f0000000280)={0x18, 0x0, {0x0, @remote, 'vlan0\x00'}}, 0x1e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r5, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) r6 = pkey_alloc(0x0, 0x2) pkey_free(r6) ioctl$KVM_ENABLE_CAP_CPU(r5, 0x4008ae9c, &(0x7f0000000140)={0x3}) 12:12:42 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x3, 0x0, 0xfdfdffff00000000, &(0x7f0000000800)}) 12:12:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534223001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:12:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001100000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:12:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:12:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x60000000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) 12:12:43 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x2, 0x0, 0x0, &(0x7f0000000800)}) 12:12:43 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x2, 0x0, 0x0, &(0x7f0000000800)}) [ 889.225392] XFS (loop2): SB sanity check failed [ 889.231382] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 889.280592] XFS (loop2): Unmount and run xfs_repair [ 889.289506] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 889.296959] 0000000052cb0f4b: 58 46 53 42 23 00 10 00 00 00 00 00 00 00 10 00 XFSB#........... [ 889.309500] 000000004443d040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 889.319020] 000000009a1b1c5e: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 889.332999] 00000000a69a1737: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 889.348862] 00000000fc5acec3: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 889.358471] 00000000adb4a17b: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 889.370482] 00000000fd251c64: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 889.396045] XFS (loop1): Mounting V4 Filesystem [ 889.424465] XFS (loop5): SB sanity check failed [ 889.429440] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 889.458946] attempt to access beyond end of device 12:12:43 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x2, 0x0, 0x0, &(0x7f0000000800)}) [ 889.469924] 000000008c2bc390: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 889.479650] loop1: rw=4096, want=2036888240641, limit=264192 [ 889.491488] XFS (loop5): Unmount and run xfs_repair [ 889.533958] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 889.541935] XFS (loop1): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 889.571451] XFS (loop2): SB validate failed with error -117. [ 889.594069] 0000000000824241: 58 46 53 42 00 00 11 00 00 00 00 00 00 00 10 00 XFSB............ [ 889.615407] XFS (loop1): empty log check failed 12:12:43 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x2, 0x0, 0x0, &(0x7f0000000800)}) [ 889.644643] XFS (loop1): log mount/recovery failed: error -5 [ 889.652146] 00000000b9b9128a: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 12:12:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="58465342000f1000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:12:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x4007, 0x0) write$P9_ROPEN(r4, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x1, 0x1, 0x8}, 0x4}}, 0x18) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) socketpair$inet(0x2, 0x6, 0x8, &(0x7f0000000180)) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3}) [ 889.712995] XFS (loop1): log mount failed [ 889.728427] 00000000c3eb83bf: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 889.814837] 00000000b7e28e9a: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ 12:12:43 executing program 4: sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000006c0)={0x2, 0x0, 0x0, &(0x7f0000000800)}) 12:12:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfl\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:12:43 executing program 4: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000006c0)={0x2, 0x0, 0x0, &(0x7f0000000800)}) [ 889.946994] 000000003be67f8b: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 890.060224] 00000000d757933f: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 890.120421] 0000000050fb134c: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 890.144350] 00000000d8953bc3: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 890.157402] XFS (loop2): SB sanity check failed [ 890.168874] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 890.168939] XFS (loop5): SB validate failed with error -117. [ 890.215572] XFS (loop2): Unmount and run xfs_repair [ 890.224985] XFS (loop2): First 128 bytes of corrupted metadata buffer: 12:12:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="584653420000000b000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) 12:12:44 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x0, 0x0, 0x0, &(0x7f0000000800)}) 12:12:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xe6030000, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) 12:12:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 890.264782] 0000000084c9e879: 58 46 53 42 00 0f 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 890.326873] 00000000adbc21a9: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 12:12:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) [ 890.416311] 00000000ec793b9b: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 890.434293] 000000000a5eb57b: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 890.473500] 0000000046e77413: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 890.506444] 00000000ac0b961a: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 890.526970] XFS (loop1): Mounting V4 Filesystem [ 890.557556] attempt to access beyond end of device [ 890.579656] 00000000d4a89832: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 890.592256] loop1: rw=4096, want=2036888240641, limit=264192 [ 890.613995] XFS (loop5): SB sanity check failed [ 890.618811] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 890.637236] XFS (loop1): metadata I/O error in "xlog_bread_noalign" at daddr 0x1da40000200 len 1 error 5 [ 890.652836] 000000006f7cfa87: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 00 00 00 ................ [ 890.674147] XFS (loop5): Unmount and run xfs_repair [ 890.681224] XFS (loop4): Invalid superblock magic number [ 890.693502] XFS (loop1): empty log check failed [ 890.700256] XFS (loop2): SB validate failed with error -117. [ 890.731317] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 890.743955] XFS (loop1): log mount/recovery failed: error -5 12:12:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534250840300000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) 12:12:44 executing program 4 (fault-call:2 fault-nth:0): r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x2, 0x0, 0x0, &(0x7f0000000800)}) [ 890.797829] 000000002a237819: 58 46 53 42 00 00 00 0b 00 00 00 00 00 00 10 00 XFSB............ [ 890.814270] XFS (loop1): log mount failed [ 890.900696] FAULT_INJECTION: forcing a failure. [ 890.900696] name failslab, interval 1, probability 0, space 0, times 0 [ 890.908354] 0000000094f6fabd: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 890.941334] CPU: 0 PID: 16546 Comm: syz-executor4 Not tainted 4.19.0-rc6+ #45 [ 890.948651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 890.958010] Call Trace: [ 890.960610] dump_stack+0x1c4/0x2b4 [ 890.964247] ? dump_stack_print_info.cold.2+0x52/0x52 [ 890.969451] should_fail.cold.4+0xa/0x17 [ 890.973521] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 890.978627] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.984168] ? wake_up_klogd+0x11a/0x180 [ 890.988235] ? console_device+0xc0/0xc0 [ 890.992211] ? vprintk_emit+0x322/0x930 [ 890.996192] ? __down_trylock_console_sem+0x155/0x200 [ 891.001397] ? wake_up_klogd+0x180/0x180 [ 891.005458] ? zap_class+0x640/0x640 [ 891.009173] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 891.014118] ? zap_class+0x640/0x640 [ 891.017843] ? fs_reclaim_acquire+0x20/0x20 [ 891.022165] ? lock_downgrade+0x900/0x900 [ 891.026317] ? ___might_sleep+0x1ed/0x300 [ 891.030644] ? arch_local_save_flags+0x40/0x40 [ 891.035231] ? vprintk_default+0x28/0x30 [ 891.039299] __should_failslab+0x124/0x180 [ 891.043534] should_failslab+0x9/0x14 [ 891.047341] kmem_cache_alloc_trace+0x2d7/0x750 [ 891.052020] kobject_uevent_env+0x2f3/0x101e [ 891.057647] ? sysfs_remove_group+0xf6/0x1b0 [ 891.063625] kobject_uevent+0x1f/0x24 [ 891.067429] device_del+0x6c9/0xb70 [ 891.071063] ? __device_links_no_driver+0x320/0x320 [ 891.076086] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 891.081127] ? kfree_const+0x47/0x70 [ 891.084847] delete_partition+0x233/0x2c0 [ 891.088993] ? bio_devname+0x90/0x90 [ 891.092712] ? _raw_spin_unlock+0x2c/0x50 [ 891.096865] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 891.102413] blkpg_ioctl+0x3c5/0xc10 [ 891.106136] ? debug_smp_processor_id+0x1c/0x20 [ 891.110804] ? perf_trace_lock+0x14d/0x7a0 [ 891.115043] ? zap_class+0x640/0x640 [ 891.118848] ? blk_ioctl_discard+0x3b0/0x3b0 [ 891.124037] ? lock_downgrade+0x900/0x900 [ 891.128191] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 891.133987] ? _parse_integer+0x180/0x180 [ 891.138147] ? avc_has_extended_perms+0xab2/0x15a0 [ 891.143079] blkdev_ioctl+0x1864/0x2010 [ 891.147067] ? blkpg_ioctl+0xc10/0xc10 [ 891.150957] ? avc_ss_reset+0x190/0x190 [ 891.154939] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 891.160745] ? zap_class+0x640/0x640 [ 891.164458] ? __f_unlock_pos+0x19/0x20 [ 891.168439] ? __fget+0x4d1/0x740 [ 891.171903] ? ___might_sleep+0x1ed/0x300 [ 891.176056] ? arch_local_save_flags+0x40/0x40 [ 891.180646] block_ioctl+0xee/0x130 [ 891.184274] ? blkdev_fallocate+0x400/0x400 [ 891.188597] do_vfs_ioctl+0x1de/0x1720 [ 891.192490] ? ioctl_preallocate+0x300/0x300 [ 891.196903] ? selinux_file_mprotect+0x620/0x620 [ 891.201662] ? __sb_end_write+0xd9/0x110 [ 891.205991] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 891.211528] ? fput+0x130/0x1a0 [ 891.214814] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 891.220353] ? security_file_ioctl+0x94/0xc0 [ 891.224768] ksys_ioctl+0xa9/0xd0 [ 891.228228] __x64_sys_ioctl+0x73/0xb0 [ 891.232127] do_syscall_64+0x1b9/0x820 [ 891.236016] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 891.242851] ? syscall_return_slowpath+0x5e0/0x5e0 [ 891.249093] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 891.253950] ? trace_hardirqs_on_caller+0x310/0x310 [ 891.258966] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 891.263985] ? prepare_exit_to_usermode+0x291/0x3b0 [ 891.269007] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 891.273857] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 891.279053] RIP: 0033:0x457579 [ 891.282253] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 891.301153] RSP: 002b:00007f77b8522c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 891.308865] RAX: ffffffffffffffda RBX: 00007f77b8522c90 RCX: 0000000000457579 [ 891.316131] RDX: 00000000200006c0 RSI: 0000000000001269 RDI: 0000000000000003 [ 891.323402] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 891.330672] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f77b85236d4 [ 891.337948] R13: 00000000004be93a R14: 00000000004ce5f0 R15: 0000000000000004 12:12:45 executing program 4 (fault-call:2 fault-nth:1): r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x2, 0x0, 0x0, &(0x7f0000000800)}) 12:12:45 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYPTR]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, &(0x7f00000001c0)={0x3}) [ 891.414462] 00000000d91b9943: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 891.424557] BUG: sleeping function called from invalid context at mm/slab.h:421 [ 891.424580] in_atomic(): 1, irqs_disabled(): 0, pid: 16502, name: syz-executor5 [ 891.424668] INFO: lockdep is turned off. [ 891.424682] Preemption disabled at: [ 891.424745] [] vprintk_emit+0x31d/0x930 [ 891.424835] CPU: 1 PID: 16502 Comm: syz-executor5 Not tainted 4.19.0-rc6+ #45 [ 891.424843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 891.424847] Call Trace: [ 891.424853] [ 891.424871] dump_stack+0x1c4/0x2b4 [ 891.424888] ? dump_stack_print_info.cold.2+0x52/0x52 [ 891.424902] ? vprintk_func+0x85/0x181 [ 891.424916] ? vprintk_emit+0x31d/0x930 [ 891.424933] ___might_sleep.cold.82+0x1ba/0x1f3 [ 891.424949] ? arch_local_save_flags+0x40/0x40 [ 891.424966] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 891.424983] __might_sleep+0x95/0x190 [ 891.425001] kmem_cache_alloc_trace+0x2cd/0x750 [ 891.425016] ? kobject_uevent_env+0x1ed/0x101e [ 891.425033] kobject_uevent_env+0x2f3/0x101e [ 891.425045] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 891.425064] kobject_uevent+0x1f/0x24 [ 891.425087] kobject_put.cold.9+0x170/0x2e4 [ 891.425104] put_device+0x20/0x30 [ 891.425118] delete_partition_rcu_cb+0x147/0x1b0 [ 891.425131] ? read_dev_sector+0x4f0/0x4f0 [ 891.425148] rcu_process_callbacks+0xf23/0x2670 [ 891.425170] ? __rcu_read_unlock+0x2f0/0x2f0 12:12:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3801, &(0x7f0000000140), 0x0, &(0x7f0000000000)=ANY=[]) socketpair(0x0, 0x806, 0x5, &(0x7f00000001c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) [ 891.425185] ? smp_apic_timer_interrupt+0x1cb/0x760 [ 891.425201] ? ret_from_intr+0xb/0x1e [ 891.425213] ? retint_kernel+0x2d/0x2d [ 891.425227] ? trace_hardirqs_on_caller+0xc0/0x310 [ 891.425239] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 891.425250] ? trace_hardirqs_off+0x310/0x310 [ 891.425264] ? __run_timers+0xa20/0xc70 [ 891.425277] ? zap_class+0x640/0x640 [ 891.425289] ? rebalance_domains+0x358/0xdc0 [ 891.425302] ? lock_downgrade+0x900/0x900 [ 891.425318] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 891.425339] ? rebalance_domains+0x375/0xdc0 [ 891.425357] ? load_balance+0x3430/0x3430 [ 891.425370] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 891.425384] ? check_preemption_disabled+0x48/0x200 [ 891.425395] ? enqueue_hrtimer+0x1a5/0x560 [ 891.425410] ? debug_smp_processor_id+0x1c/0x20 [ 891.425421] ? perf_trace_lock+0x14d/0x7a0 [ 891.425440] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 891.425455] ? check_preemption_disabled+0x48/0x200 [ 891.425472] ? run_rebalance_domains+0x38d/0x500 [ 891.425485] ? _nohz_idle_balance+0x7a0/0x7a0 12:12:45 executing program 1 (fault-call:3 fault-nth:0): r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x3, 0x0, 0x0, &(0x7f0000000800)}) [ 891.425497] ? trace_hardirqs_on+0xbd/0x310 [ 891.425510] ? kvm_sched_clock_read+0x9/0x20 [ 891.425523] ? irq_exit+0x17f/0x1c0 [ 891.425535] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 891.425549] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 891.425563] ? check_preemption_disabled+0x48/0x200 [ 891.425581] __do_softirq+0x30b/0xad8 [ 891.425608] ? __irqentry_text_end+0x1f9618/0x1f9618 [ 891.425625] ? pvclock_read_flags+0x160/0x160 [ 891.425638] ? lapic_next_event+0x5a/0x90 [ 891.425650] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 891.425663] ? clockevents_program_event+0x140/0x370 [ 891.425680] ? kvm_clock_read+0x18/0x30 [ 891.425692] ? kvm_sched_clock_read+0x9/0x20 [ 891.425707] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 891.425720] ? check_preemption_disabled+0x48/0x200 [ 891.425741] irq_exit+0x17f/0x1c0 [ 891.425754] smp_apic_timer_interrupt+0x1cb/0x760 [ 891.425767] ? smp_reschedule_interrupt+0x109/0x650 [ 891.425782] ? smp_call_function_single_interrupt+0x650/0x650 [ 891.425794] ? interrupt_entry+0xb5/0xf0 [ 891.425808] ? trace_hardirqs_off_caller+0xbb/0x310 [ 891.425821] ? trace_hardirqs_off_caller+0xbb/0x310 [ 891.425834] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 891.425848] ? trace_hardirqs_on_caller+0x310/0x310 [ 891.425860] ? trace_hardirqs_on_caller+0x310/0x310 [ 891.425873] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 891.425887] ? check_preemption_disabled+0x48/0x200 [ 891.425900] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 891.425918] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 891.425937] apic_timer_interrupt+0xf/0x20 [ 891.425943] [ 891.425958] RIP: 0010:console_unlock+0xd1b/0x1160 [ 891.425971] Code: c1 e8 03 42 80 3c 30 00 0f 85 56 03 00 00 48 83 3d 21 77 cd 07 00 0f 84 63 02 00 00 e8 8e 3a 1a 00 48 8b bd b0 fe ff ff 57 9d <0f> 1f 44 00 00 e9 19 f5 ff ff e8 76 3a 1a 00 48 8b 7d 08 c7 05 48 [ 891.425979] RSP: 0018:ffff880187d8eb48 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 891.425993] RAX: 0000000000040000 RBX: 0000000000000200 RCX: ffffc9000bf4e000 [ 891.426002] RDX: 0000000000040000 RSI: ffffffff81647af2 RDI: 0000000000000246 [ 891.426010] RBP: ffff880187d8ecb0 R08: ffff8801d25345c0 R09: fffffbfff12720b0 [ 891.426017] R10: fffffbfff12720b0 R11: ffffffff89390583 R12: 0000000000000000 [ 891.426025] R13: ffffffff8487f5c0 R14: dffffc0000000000 R15: ffffffff899424f0 [ 891.426041] ? netconsole_netdev_event+0x280/0x280 [ 891.426059] ? console_unlock+0xd12/0x1160 [ 891.426093] ? devkmsg_read+0xbb0/0xbb0 [ 891.426106] ? console_trylock+0x15/0xa0 [ 891.426120] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 891.426134] ? vprintk_emit+0x322/0x930 [ 891.426146] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 891.426161] ? vprintk_emit+0x322/0x930 [ 891.426176] ? __down_trylock_console_sem+0x155/0x200 [ 891.426193] vprintk_emit+0x33d/0x930 [ 891.426210] ? wake_up_klogd+0x180/0x180 [ 891.426222] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 891.426235] ? trace_hardirqs_off+0x310/0x310 [ 891.426249] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 891.426259] ? _kstrtoull+0x181/0x250 [ 891.426274] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 891.426289] ? retint_kernel+0x2d/0x2d [ 891.426304] vprintk_default+0x28/0x30 [ 891.426314] vprintk_func+0x7e/0x181 [ 891.426326] printk+0xa7/0xcf [ 891.426338] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 891.426351] ? hex_dump_to_buffer+0x4b3/0xc70 [ 891.426370] print_hex_dump.cold.1+0x29/0x87 [ 891.426385] ? hex_dump_to_buffer+0xc70/0xc70 [ 891.426400] ? xfs_emerg+0x270/0x270 [ 891.426420] ? xfs_buf_ioend_work+0x20/0x20 [ 891.426431] ? trace_hardirqs_on+0xbd/0x310 [ 891.426442] ? xfs_readsb+0x307/0x5f0 [ 891.426459] xfs_hex_dump+0x3b/0x46 [ 891.426474] xfs_buf_verifier_error+0x233/0x310 12:12:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="584653420000000b000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000000)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0), 0x2}}, 0x20) [ 891.426492] ? xfs_sb_read_verify+0x4b2/0x600 [ 891.426506] xfs_verifier_error+0x3f/0x50 [ 891.426520] xfs_sb_read_verify+0x4d6/0x600 [ 891.426536] ? xfs_sb_write_verify+0x4d0/0x4d0 [ 891.426549] ? kasan_check_write+0x14/0x20 [ 891.426561] ? bio_init+0x13c/0x270 [ 891.426607] xfs_buf_ioend+0x298/0x1080 [ 891.426622] ? xfs_buf_unlock+0x430/0x430 [ 891.426647] ? __rhashtable_lookup.isra.17.constprop.30+0x870/0x870 [ 891.426663] ? xfs_buf_hold+0xf3/0x440 [ 891.426675] ? __xfs_buf_submit+0x1c7/0xdf0 [ 891.426689] ? xfs_buf_get_uncached+0x890/0x890 [ 891.426700] ? kasan_check_write+0x14/0x20 [ 891.426713] ? do_raw_spin_lock+0xc1/0x200 [ 891.426731] ? xfs_buf_rele+0x8fb/0x1a20 [ 891.426748] __xfs_buf_submit+0x3dc/0xdf0 [ 891.426764] ? xfs_buf_ioerror_alert+0x1c0/0x1c0 [ 891.426778] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 891.426789] ? xfs_buf_get_uncached+0x399/0x890 [ 891.426798] ? up+0xea/0x1c0 [ 891.426812] ? xfs_buf_associate_memory+0x3b0/0x3b0 [ 891.426826] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 891.426838] ? up+0xea/0x1c0 [ 891.426858] xfs_buf_read_uncached+0x1ce/0x6a0 [ 891.426872] ? xfs_buf_readahead_map+0x1f0/0x1f0 [ 891.426884] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 891.426897] ? xfs_sb_quota_from_disk+0x28a/0x2d0 [ 891.426912] ? __xfs_sb_from_disk+0x150a/0x1a30 [ 891.426931] xfs_readsb+0x307/0x5f0 [ 891.426950] ? xfs_initialize_perag+0x4b0/0x4b0 [ 891.426964] ? xfs_init_mount_workqueues+0x401/0x6d0 [ 891.426980] xfs_fs_fill_super+0x9ba/0x16f0 [ 891.426995] ? xfs_test_remount_options+0x90/0x90 [ 891.427013] ? selinux_capable+0x36/0x40 [ 891.427028] ? snprintf+0xae/0xe0 [ 891.427039] ? vsprintf+0x40/0x40 [ 891.427052] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 891.427068] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 891.427096] mount_bdev+0x30c/0x3e0 [ 891.427108] ? xfs_test_remount_options+0x90/0x90 [ 891.427122] xfs_fs_mount+0x34/0x40 [ 891.427135] mount_fs+0xae/0x31d [ 891.427155] vfs_kern_mount.part.35+0xdc/0x4f0 [ 891.427171] ? may_umount+0xb0/0xb0 [ 891.427182] ? _raw_read_unlock+0x3f/0x50 [ 891.427196] ? __get_fs_type+0x97/0xc0 [ 891.427212] do_mount+0x581/0x31f0 [ 891.427224] ? trace_hardirqs_off+0x310/0x310 [ 891.427234] ? trace_hardirqs_on+0x310/0x310 [ 891.427248] ? copy_mount_string+0x40/0x40 [ 891.427263] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 891.427279] ? retint_kernel+0x2d/0x2d [ 891.427298] ? copy_mount_options+0x1f3/0x380 [ 891.427310] ? copy_mount_options+0x1fd/0x380 [ 891.427324] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 891.427335] ? copy_mount_options+0x288/0x380 [ 891.427349] ksys_mount+0x12d/0x140 [ 891.427364] __x64_sys_mount+0xbe/0x150 [ 891.427378] ? do_syscall_64+0xca/0x820 [ 891.427392] do_syscall_64+0x1b9/0x820 [ 891.427405] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 891.427419] ? syscall_return_slowpath+0x5e0/0x5e0 [ 891.427432] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 891.427446] ? trace_hardirqs_on_caller+0x310/0x310 [ 891.427461] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 891.427473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 891.427486] ? prepare_exit_to_usermode+0x291/0x3b0 [ 891.427501] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 891.427518] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 891.427529] RIP: 0033:0x459fea [ 891.427542] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 891.427549] RSP: 002b:00007fa3f9696a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 891.427563] RAX: ffffffffffffffda RBX: 00007fa3f9696b30 RCX: 0000000000459fea [ 891.427572] RDX: 00007fa3f9696ad0 RSI: 0000000020000100 RDI: 00007fa3f9696af0 [ 891.427580] RBP: 0000000020000100 R08: 00007fa3f9696b30 R09: 00007fa3f9696ad0 [ 891.427594] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 891.427602] R13: 0000000000000000 R14: 00000000004d7ef0 R15: 00000000ffffffff [ 891.595991] 00000000aa993f73: 00 00 00 3b 48 00 00 40 00 00 00 00 00 00 00 80 ...;H..@........ [ 891.758064] 00000000b1a0a7f9: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 891.764786] 000000007c444c97: 00 00 00 07 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 891.806891] 000000007b345c61: 00 00 06 c0 34 a4 02 00 01 00 00 10 00 00 00 00 ....4........... [ 891.828283] 00000000b1532b56: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 891.849540] XFS (loop5): SB validate failed with error -117. [ 892.069557] FAULT_INJECTION: forcing a failure. [ 892.069557] name failslab, interval 1, probability 0, space 0, times 0 [ 892.077588] CPU: 1 PID: 16561 Comm: syz-executor4 Tainted: G W 4.19.0-rc6+ #45 [ 892.457363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 892.466705] Call Trace: [ 892.469286] dump_stack+0x1c4/0x2b4 [ 892.473018] ? dump_stack_print_info.cold.2+0x52/0x52 [ 892.478203] should_fail.cold.4+0xa/0x17 [ 892.482255] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 892.487470] ? save_stack+0xa9/0xd0 [ 892.491086] ? save_stack+0x43/0xd0 [ 892.494699] ? kmem_cache_alloc_trace+0x152/0x750 [ 892.499527] ? kobject_uevent_env+0x2f3/0x101e [ 892.504107] ? kobject_uevent+0x1f/0x24 [ 892.508070] ? device_del+0x6c9/0xb70 [ 892.511856] ? delete_partition+0x233/0x2c0 [ 892.516175] ? blkpg_ioctl+0x3c5/0xc10 [ 892.520050] ? blkdev_ioctl+0x1864/0x2010 [ 892.524184] ? do_vfs_ioctl+0x1de/0x1720 [ 892.528242] ? ksys_ioctl+0xa9/0xd0 [ 892.531858] ? __x64_sys_ioctl+0x73/0xb0 [ 892.535909] ? do_syscall_64+0x1b9/0x820 [ 892.539959] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 892.545323] ? zap_class+0x640/0x640 [ 892.549029] ? fs_reclaim_acquire+0x20/0x20 [ 892.553341] ? lock_downgrade+0x900/0x900 [ 892.557480] ? ___might_sleep+0x1ed/0x300 [ 892.561622] ? lock_downgrade+0x900/0x900 [ 892.565763] ? arch_local_save_flags+0x40/0x40 [ 892.570342] __should_failslab+0x124/0x180 [ 892.574569] should_failslab+0x9/0x14 [ 892.578377] __kmalloc+0x2d4/0x760 [ 892.581910] ? kobject_get_path+0xc2/0x1b0 [ 892.586135] ? kmem_cache_alloc_trace+0x31f/0x750 [ 892.590977] kobject_get_path+0xc2/0x1b0 [ 892.595031] kobject_uevent_env+0x314/0x101e [ 892.599431] ? sysfs_remove_group+0xf6/0x1b0 [ 892.603838] kobject_uevent+0x1f/0x24 [ 892.607632] device_del+0x6c9/0xb70 [ 892.611255] ? __device_links_no_driver+0x320/0x320 [ 892.616265] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 892.621272] ? kfree_const+0x47/0x70 [ 892.624989] delete_partition+0x233/0x2c0 [ 892.629128] ? bio_devname+0x90/0x90 [ 892.632830] ? _raw_spin_unlock+0x2c/0x50 [ 892.636989] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 892.642523] blkpg_ioctl+0x3c5/0xc10 [ 892.646229] ? debug_smp_processor_id+0x1c/0x20 [ 892.650888] ? perf_trace_lock+0x14d/0x7a0 [ 892.655113] ? zap_class+0x640/0x640 [ 892.658822] ? blk_ioctl_discard+0x3b0/0x3b0 [ 892.663222] ? lock_downgrade+0x900/0x900 [ 892.667361] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 892.673148] ? _parse_integer+0x180/0x180 [ 892.677694] ? avc_has_extended_perms+0xab2/0x15a0 [ 892.682619] blkdev_ioctl+0x1864/0x2010 [ 892.686581] ? blkpg_ioctl+0xc10/0xc10 [ 892.690453] ? avc_ss_reset+0x190/0x190 [ 892.694421] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 892.700205] ? zap_class+0x640/0x640 [ 892.703911] ? __f_unlock_pos+0x19/0x20 [ 892.707877] ? __fget+0x4d1/0x740 [ 892.711323] ? ___might_sleep+0x1ed/0x300 [ 892.715460] ? arch_local_save_flags+0x40/0x40 [ 892.720041] block_ioctl+0xee/0x130 [ 892.723657] ? blkdev_fallocate+0x400/0x400 [ 892.727977] do_vfs_ioctl+0x1de/0x1720 [ 892.731855] ? ioctl_preallocate+0x300/0x300 [ 892.736255] ? selinux_file_mprotect+0x620/0x620 [ 892.741004] ? __sb_end_write+0xd9/0x110 [ 892.745059] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 892.750582] ? fput+0x130/0x1a0 [ 892.753853] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 892.759383] ? security_file_ioctl+0x94/0xc0 [ 892.763783] ksys_ioctl+0xa9/0xd0 [ 892.767227] __x64_sys_ioctl+0x73/0xb0 [ 892.771106] do_syscall_64+0x1b9/0x820 [ 892.774981] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 892.780340] ? syscall_return_slowpath+0x5e0/0x5e0 [ 892.785263] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 892.790098] ? trace_hardirqs_on_caller+0x310/0x310 [ 892.795104] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 892.800110] ? prepare_exit_to_usermode+0x291/0x3b0 [ 892.805123] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 892.809969] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 892.815144] RIP: 0033:0x457579 [ 892.818325] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 892.837213] RSP: 002b:00007f77b8522c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 892.845383] RAX: ffffffffffffffda RBX: 00007f77b8522c90 RCX: 0000000000457579 [ 892.852654] RDX: 00000000200006c0 RSI: 0000000000001269 RDI: 0000000000000003 [ 892.859915] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 892.867179] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f77b85236d4 [ 892.874438] R13: 00000000004be93a R14: 00000000004ce5f0 R15: 0000000000000004 [ 892.950215] BUG: sleeping function called from invalid context at mm/slab.h:421 [ 892.957733] in_atomic(): 1, irqs_disabled(): 0, pid: 16561, name: syz-executor4 [ 892.965212] INFO: lockdep is turned off. [ 892.969272] Preemption disabled at: [ 892.969296] [] debug_check_no_obj_freed+0x17a/0x58d [ 892.979572] CPU: 1 PID: 16561 Comm: syz-executor4 Tainted: G W 4.19.0-rc6+ #45 [ 892.988236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 892.997588] Call Trace: [ 893.000155] [ 893.002300] dump_stack+0x1c4/0x2b4 [ 893.005918] ? dump_stack_print_info.cold.2+0x52/0x52 [ 893.011101] ? fs_reclaim_acquire+0x20/0x20 [ 893.015404] ? vprintk_func+0x85/0x181 [ 893.019288] ? vprintk_func+0x85/0x181 [ 893.023164] ? debug_check_no_obj_freed+0x17a/0x58d [ 893.028178] ___might_sleep.cold.82+0x1ba/0x1f3 [ 893.032834] ? arch_local_save_flags+0x40/0x40 [ 893.037402] ? vprintk_default+0x28/0x30 [ 893.041454] __might_sleep+0x95/0x190 [ 893.045245] kmem_cache_alloc_trace+0x2cd/0x750 [ 893.049902] ? vprintk_default+0x28/0x30 [ 893.053971] kobject_uevent_env+0x2f3/0x101e [ 893.058364] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 893.063108] kobject_uevent+0x1f/0x24 [ 893.066896] kobject_put.cold.9+0x170/0x2e4 [ 893.071206] put_device+0x20/0x30 [ 893.074643] delete_partition_rcu_cb+0x147/0x1b0 [ 893.079394] ? read_dev_sector+0x4f0/0x4f0 [ 893.083615] rcu_process_callbacks+0xf23/0x2670 [ 893.088276] ? __rcu_read_unlock+0x2f0/0x2f0 [ 893.092675] ? zap_class+0x640/0x640 [ 893.096376] ? __run_timers+0xa20/0xc70 [ 893.100349] ? mark_held_locks+0x130/0x130 [ 893.104571] ? trace_hardirqs_on+0xbd/0x310 [ 893.108879] ? kasan_check_read+0x11/0x20 [ 893.113024] ? __run_timers+0xa20/0xc70 [ 893.116985] ? kasan_check_write+0x14/0x20 [ 893.121210] ? _raw_spin_unlock_irq+0x60/0x80 [ 893.125690] ? __run_timers+0xa4a/0xc70 [ 893.129657] ? __bpf_trace_timer_expire_entry+0x30/0x30 [ 893.135009] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 893.140011] ? timerqueue_add+0x207/0x2b0 [ 893.144145] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 893.149667] ? check_preemption_disabled+0x48/0x200 [ 893.154666] ? enqueue_hrtimer+0x1a5/0x560 [ 893.158900] ? debug_smp_processor_id+0x1c/0x20 [ 893.163558] ? perf_trace_lock+0x14d/0x7a0 [ 893.167779] ? trace_hardirqs_on+0x310/0x310 [ 893.172179] ? pvclock_read_flags+0x160/0x160 [ 893.176659] ? lock_downgrade+0x900/0x900 [ 893.180796] ? trace_hardirqs_on+0xbd/0x310 [ 893.185101] ? kvm_sched_clock_read+0x9/0x20 [ 893.189494] ? irq_exit+0x17f/0x1c0 [ 893.193119] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 893.198651] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 893.204177] ? check_preemption_disabled+0x48/0x200 [ 893.209187] __do_softirq+0x30b/0xad8 [ 893.212987] ? __irqentry_text_end+0x1f9618/0x1f9618 [ 893.218077] ? pvclock_read_flags+0x160/0x160 [ 893.222555] ? lapic_next_event+0x5a/0x90 [ 893.226691] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 893.232215] ? clockevents_program_event+0x140/0x370 [ 893.237307] ? kvm_clock_read+0x18/0x30 [ 893.241268] ? kvm_sched_clock_read+0x9/0x20 [ 893.245663] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 893.251187] ? check_preemption_disabled+0x48/0x200 [ 893.256196] irq_exit+0x17f/0x1c0 [ 893.259634] smp_apic_timer_interrupt+0x1cb/0x760 [ 893.264461] ? smp_reschedule_interrupt+0x109/0x650 [ 893.269465] ? smp_call_function_single_interrupt+0x650/0x650 [ 893.275335] ? interrupt_entry+0xb5/0xf0 [ 893.279386] ? trace_hardirqs_off_caller+0xbb/0x310 [ 893.284400] ? trace_hardirqs_off_caller+0xbb/0x310 [ 893.289419] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 893.294252] ? trace_hardirqs_on_caller+0x310/0x310 [ 893.299264] ? trace_hardirqs_on_caller+0x310/0x310 [ 893.304265] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 893.309788] ? check_preemption_disabled+0x48/0x200 [ 893.314790] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 893.320327] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 893.325159] apic_timer_interrupt+0xf/0x20 [ 893.329374] [ 893.331609] RIP: 0010:_raw_spin_unlock_irqrestore+0xaf/0xd0 [ 893.337310] Code: 08 f2 31 89 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 75 28 48 83 3d 60 c4 81 01 00 74 15 48 89 df 57 9d <0f> 1f 44 00 00 eb ad e8 ec 4f 50 f9 eb bb 0f 0b 0f 0b e8 5a e8 11 [ 893.356202] RSP: 0018:ffff880181ff5bf0 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 [ 893.363917] RAX: dffffc0000000000 RBX: 0000000000000286 RCX: ffffffff8184c1ba [ 893.371175] RDX: 1ffffffff1263e41 RSI: ffffffff8184c1d4 RDI: 0000000000000286 [ 893.378434] RBP: ffff880181ff5c00 R08: ffff8801d2ed0080 R09: fffffbfff160f1e5 [ 893.385691] R10: fffffbfff160f1e5 R11: ffffffff8b078f2b R12: ffffffff8b078f28 [ 893.392963] R13: 0000000000000000 R14: dffffc0000000000 R15: ffffffff8b078f28 [ 893.400236] ? trace_hardirqs_on+0x9a/0x310 [ 893.404545] ? trace_hardirqs_on+0xb4/0x310 [ 893.408870] debug_check_no_obj_freed+0x305/0x58d [ 893.413721] ? free_obj_work+0xb80/0xb80 [ 893.417774] __free_pages_ok+0x44b/0x1660 [ 893.421916] ? free_one_page+0x1700/0x1700 [ 893.426141] ? trace_hardirqs_on+0xbd/0x310 [ 893.430459] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 893.435995] ? check_preemption_disabled+0x48/0x200 [ 893.441000] ? debug_smp_processor_id+0x1c/0x20 [ 893.445657] ? perf_trace_lock+0x14d/0x7a0 [ 893.449882] ? zap_class+0x640/0x640 [ 893.453594] ? check_preemption_disabled+0x48/0x200 [ 893.458601] ? debug_smp_processor_id+0x1c/0x20 [ 893.463262] ? zap_class+0x640/0x640 [ 893.466962] ? zap_class+0x640/0x640 [ 893.470666] ? free_transhuge_page+0x302/0x490 [ 893.475237] ? lock_downgrade+0x900/0x900 [ 893.479380] ? __page_frag_cache_drain+0x200/0x200 [ 893.484301] ? trace_hardirqs_on+0xbd/0x310 [ 893.488609] ? free_transhuge_page+0x302/0x490 [ 893.493195] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 893.498632] ? kasan_check_write+0x14/0x20 [ 893.502856] ? do_raw_spin_lock+0xc1/0x200 [ 893.507080] free_compound_page+0x62/0x90 [ 893.511214] free_transhuge_page+0x30a/0x490 [ 893.515605] ? lock_downgrade+0x900/0x900 [ 893.519743] ? split_huge_pages_set+0xa90/0xa90 [ 893.524398] ? kasan_check_read+0x11/0x20 [ 893.528539] ? release_pages+0xa5b/0x26a0 [ 893.532674] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 893.538129] ? __this_cpu_preempt_check+0x1c/0x1f [ 893.542965] __put_compound_page+0x96/0xe0 [ 893.547187] release_pages+0xa68/0x26a0 [ 893.551153] ? put_pages_list+0x550/0x550 [ 893.555287] ? check_preemption_disabled+0x48/0x200 [ 893.560295] ? debug_smp_processor_id+0x1c/0x20 [ 893.564951] ? perf_trace_lock+0x14d/0x7a0 [ 893.569181] ? debug_smp_processor_id+0x1c/0x20 [ 893.573846] ? perf_trace_lock+0x14d/0x7a0 [ 893.578069] ? zap_class+0x640/0x640 [ 893.581773] ? zap_class+0x640/0x640 [ 893.585484] ? zap_class+0x640/0x640 [ 893.589190] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 893.594197] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 893.598946] ? lock_acquire+0x1ed/0x520 [ 893.602914] ? zap_class+0x640/0x640 [ 893.606615] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 893.612141] ? perf_trace_lock+0x14d/0x7a0 [ 893.616366] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 893.622174] ? zap_class+0x640/0x640 [ 893.625884] ? trace_hardirqs_off+0xb8/0x310 [ 893.630286] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 893.635812] ? __phys_addr+0xa6/0x120 [ 893.639606] ? switch_mm_irqs_off+0x8d7/0x1620 [ 893.644179] ? load_new_mm_cr3+0x200/0x200 [ 893.648403] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 893.653930] ? zap_class+0x640/0x640 [ 893.657632] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 893.663159] ? lock_downgrade+0x900/0x900 [ 893.667294] ? __page_mapcount+0x580/0x580 [ 893.671522] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 893.677306] ? vma_kernel_pagesize+0xb0/0xb0 [ 893.681704] ? flush_tlb_func_common.constprop.16+0x600/0xd10 [ 893.687581] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 893.693108] ? check_preemption_disabled+0x48/0x200 [ 893.698112] ? do_raw_spin_unlock+0xa7/0x2f0 [ 893.702511] ? debug_smp_processor_id+0x1c/0x20 [ 893.707166] ? perf_trace_lock+0x14d/0x7a0 [ 893.711395] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 893.716927] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 893.722452] ? lru_add_drain_cpu+0x1c0/0x500 [ 893.726849] free_pages_and_swap_cache+0x475/0x6f0 [ 893.731772] ? free_page_and_swap_cache+0x950/0x950 [ 893.736780] ? zap_class+0x640/0x640 [ 893.740479] ? unmap_page_range+0x1867/0x2030 [ 893.744959] ? lock_downgrade+0x900/0x900 [ 893.749097] ? kasan_check_read+0x11/0x20 [ 893.753234] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 893.757802] ? __pte_alloc_kernel+0x220/0x220 [ 893.762297] tlb_flush_mmu_free+0xff/0x1b0 [ 893.766521] unmap_page_range+0x1873/0x2030 [ 893.770839] ? vm_normal_page_pmd+0x2f0/0x2f0 [ 893.775331] ? is_bpf_text_address+0xd3/0x170 [ 893.779825] ? kernel_text_address+0x79/0xf0 [ 893.784230] ? __kernel_text_address+0xd/0x40 [ 893.788713] ? unwind_get_return_address+0x61/0xa0 [ 893.793633] ? save_stack+0xa9/0xd0 [ 893.797248] ? __kasan_slab_free+0x102/0x150 [ 893.801640] ? kasan_slab_free+0xe/0x10 [ 893.805603] ? kmem_cache_free+0x83/0x290 [ 893.809737] ? __khugepaged_exit+0x429/0x6a0 [ 893.814131] ? mmput+0x4dc/0x610 [ 893.817484] ? do_exit+0xe6f/0x2610 [ 893.821107] ? do_group_exit+0x177/0x440 [ 893.825154] ? get_signal+0x8b0/0x1980 [ 893.829026] ? do_signal+0x9c/0x21e0 [ 893.832727] ? exit_to_usermode_loop+0x2e5/0x380 [ 893.837468] ? do_syscall_64+0x6be/0x820 [ 893.841526] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 893.847420] ? trace_hardirqs_off+0xb8/0x310 [ 893.851814] ? kasan_check_read+0x11/0x20 [ 893.855946] ? do_raw_spin_unlock+0xa7/0x2f0 [ 893.860337] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 893.865867] ? uprobe_munmap+0x14c/0x450 [ 893.869923] ? uprobe_mmap+0xd50/0xd50 [ 893.873799] ? trace_hardirqs_off+0xb8/0x310 [ 893.878194] ? debug_check_no_obj_freed+0x305/0x58d [ 893.883207] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 893.888732] ? check_preemption_disabled+0x48/0x200 [ 893.893736] unmap_single_vma+0x19b/0x310 [ 893.897886] unmap_vmas+0x125/0x200 [ 893.901502] exit_mmap+0x2be/0x590 [ 893.905027] ? __ia32_sys_munmap+0x80/0x80 [ 893.909251] ? __khugepaged_exit+0x455/0x6a0 [ 893.913653] ? __might_sleep+0x95/0x190 [ 893.917614] mmput+0x247/0x610 [ 893.920794] ? lock_downgrade+0x900/0x900 [ 893.924926] ? set_mm_exe_file+0x200/0x200 [ 893.929148] ? kasan_check_read+0x11/0x20 [ 893.933285] ? do_raw_spin_unlock+0xa7/0x2f0 [ 893.937681] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 893.942251] ? kasan_check_write+0x14/0x20 [ 893.946472] ? do_raw_spin_lock+0xc1/0x200 [ 893.950694] do_exit+0xe6f/0x2610 [ 893.954135] ? __bpf_trace_preemptirq_template+0x11/0x30 [ 893.959568] ? mm_update_next_owner+0x990/0x990 [ 893.964224] ? zap_class+0x640/0x640 [ 893.967921] ? debug_object_active_state+0x2f5/0x4d0 [ 893.973006] ? lock_downgrade+0x900/0x900 [ 893.977145] ? trace_hardirqs_on+0xbd/0x310 [ 893.981451] ? kasan_check_read+0x11/0x20 [ 893.985584] ? mark_held_locks+0x130/0x130 [ 893.989801] ? kasan_check_write+0x14/0x20 [ 893.994021] ? do_raw_spin_lock+0xc1/0x200 [ 893.998245] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 894.003770] ? check_preemption_disabled+0x48/0x200 [ 894.008776] ? mark_held_locks+0x130/0x130 [ 894.013000] ? debug_smp_processor_id+0x1c/0x20 [ 894.017671] ? perf_trace_lock+0x14d/0x7a0 [ 894.021891] ? check_preemption_disabled+0x48/0x200 [ 894.026895] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 894.032430] ? check_preemption_disabled+0x48/0x200 [ 894.037432] ? debug_smp_processor_id+0x1c/0x20 [ 894.042086] ? perf_trace_lock+0x14d/0x7a0 [ 894.046306] ? trace_hardirqs_on+0xbd/0x310 [ 894.050615] ? zap_class+0x640/0x640 [ 894.054402] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 894.059927] ? check_preemption_disabled+0x48/0x200 [ 894.064930] ? zap_class+0x640/0x640 [ 894.068630] ? memset+0x31/0x40 [ 894.071897] ? __dequeue_signal+0xf9/0x7d0 [ 894.076120] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 894.081644] ? zap_class+0x640/0x640 [ 894.085342] ? get_signal+0x95b/0x1980 [ 894.089216] ? lock_downgrade+0x900/0x900 [ 894.093349] ? do_raw_spin_lock+0xc1/0x200 [ 894.097579] do_group_exit+0x177/0x440 [ 894.101454] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 894.106891] ? __ia32_sys_exit+0x50/0x50 [ 894.110941] ? kasan_check_write+0x14/0x20 [ 894.115159] ? do_raw_spin_lock+0xc1/0x200 [ 894.119383] get_signal+0x8b0/0x1980 [ 894.123086] ? ptrace_notify+0x130/0x130 [ 894.127134] ? zap_class+0x640/0x640 [ 894.130844] ? __f_unlock_pos+0x19/0x20 [ 894.134810] ? __fget+0x4d1/0x740 [ 894.138260] do_signal+0x9c/0x21e0 [ 894.141788] ? setup_sigcontext+0x7d0/0x7d0 [ 894.146092] ? blkdev_fallocate+0x400/0x400 [ 894.150398] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 894.155920] ? do_vfs_ioctl+0x201/0x1720 [ 894.159978] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 894.165501] ? check_preemption_disabled+0x48/0x200 [ 894.170509] ? cpumask_weight.constprop.5+0x3f/0x3f [ 894.175509] ? fput+0x130/0x1a0 [ 894.178779] exit_to_usermode_loop+0x2e5/0x380 [ 894.183352] ? syscall_slow_exit_work+0x520/0x520 [ 894.188181] ? ksys_ioctl+0x81/0xd0 [ 894.191799] do_syscall_64+0x6be/0x820 [ 894.195680] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 894.201069] ? syscall_return_slowpath+0x5e0/0x5e0 [ 894.205989] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 894.210833] ? trace_hardirqs_on_caller+0x310/0x310 [ 894.215846] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 894.220869] ? prepare_exit_to_usermode+0x291/0x3b0 [ 894.225877] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 894.230710] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 894.235899] RIP: 0033:0x457579 [ 894.239081] Code: Bad RIP value. [ 894.242430] RSP: 002b:00007f77b8522c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 894.250131] RAX: 0000000000000000 RBX: 00007f77b8522c90 RCX: 0000000000457579 [ 894.257393] RDX: 00000000200006c0 RSI: 0000000000001269 RDI: 0000000000000003 [ 894.264653] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 894.271911] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f77b85236d4 [ 894.279171] R13: 00000000004be93a R14: 00000000004ce5f0 R15: 0000000000000004 [ 894.286527] BUG: sleeping function called from invalid context at mm/slab.c:3066 [ 894.294094] in_atomic(): 1, irqs_disabled(): 0, pid: 16561, name: syz-executor4 [ 894.301586] INFO: lockdep is turned off. 12:12:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200000700000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a402000100001000", 0x6d}], 0x0, &(0x7f0000000000)=ANY=[]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'cgroup[{eth0'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}}) [ 894.305643] Preemption disabled at: [ 894.305667] [] debug_check_no_obj_freed+0x17a/0x58d [ 894.315927] CPU: 1 PID: 16561 Comm: syz-executor4 Tainted: G W 4.19.0-rc6+ #45 [ 894.324588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 894.333939] Call Trace: [ 894.336519] [ 894.338666] dump_stack+0x1c4/0x2b4 [ 894.342282] ? dump_stack_print_info.cold.2+0x52/0x52 [ 894.347459] ? fs_reclaim_acquire+0x20/0x20 [ 894.351764] ? vprintk_func+0x85/0x181 [ 894.355635] ? vprintk_func+0x85/0x181 [ 894.359513] ? debug_check_no_obj_freed+0x17a/0x58d [ 894.364537] ___might_sleep.cold.82+0x1ba/0x1f3 [ 894.369283] ? arch_local_save_flags+0x40/0x40 [ 894.373858] ? vprintk_default+0x28/0x30 [ 894.377915] __might_sleep+0x95/0x190 [ 894.381705] ? __should_failslab+0x12b/0x180 [ 894.386106] kmem_cache_alloc_trace+0x307/0x750 [ 894.390769] ? vprintk_default+0x28/0x30 [ 894.394830] kobject_uevent_env+0x2f3/0x101e [ 894.399228] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 894.403979] kobject_uevent+0x1f/0x24 [ 894.407770] kobject_put.cold.9+0x170/0x2e4 [ 894.412083] put_device+0x20/0x30 [ 894.415526] delete_partition_rcu_cb+0x147/0x1b0 [ 894.420268] ? read_dev_sector+0x4f0/0x4f0 [ 894.424500] rcu_process_callbacks+0xf23/0x2670 [ 894.429164] ? __rcu_read_unlock+0x2f0/0x2f0 [ 894.433566] ? zap_class+0x640/0x640 [ 894.437270] ? __run_timers+0xa20/0xc70 [ 894.441235] ? mark_held_locks+0x130/0x130 [ 894.445460] ? trace_hardirqs_on+0xbd/0x310 [ 894.449768] ? kasan_check_read+0x11/0x20 [ 894.453904] ? __run_timers+0xa20/0xc70 [ 894.457869] ? kasan_check_write+0x14/0x20 [ 894.462095] ? _raw_spin_unlock_irq+0x60/0x80 [ 894.466581] ? __run_timers+0xa4a/0xc70 [ 894.470547] ? __bpf_trace_timer_expire_entry+0x30/0x30 [ 894.475903] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 894.480908] ? timerqueue_add+0x207/0x2b0 [ 894.485050] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 894.490578] ? check_preemption_disabled+0x48/0x200 [ 894.495583] ? enqueue_hrtimer+0x1a5/0x560 [ 894.499819] ? debug_smp_processor_id+0x1c/0x20 [ 894.504478] ? perf_trace_lock+0x14d/0x7a0 [ 894.508701] ? trace_hardirqs_on+0x310/0x310 [ 894.513102] ? pvclock_read_flags+0x160/0x160 [ 894.517581] ? lock_downgrade+0x900/0x900 [ 894.521720] ? trace_hardirqs_on+0xbd/0x310 [ 894.526040] ? kvm_sched_clock_read+0x9/0x20 [ 894.530438] ? irq_exit+0x17f/0x1c0 [ 894.534053] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 894.539573] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 894.545094] ? check_preemption_disabled+0x48/0x200 [ 894.550100] __do_softirq+0x30b/0xad8 [ 894.553891] ? __irqentry_text_end+0x1f9618/0x1f9618 [ 894.558981] ? pvclock_read_flags+0x160/0x160 [ 894.563460] ? lapic_next_event+0x5a/0x90 [ 894.567593] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 894.573114] ? clockevents_program_event+0x140/0x370 [ 894.578207] ? kvm_clock_read+0x18/0x30 [ 894.582169] ? kvm_sched_clock_read+0x9/0x20 [ 894.586563] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 894.592088] ? check_preemption_disabled+0x48/0x200 [ 894.597095] irq_exit+0x17f/0x1c0 [ 894.600534] smp_apic_timer_interrupt+0x1cb/0x760 [ 894.605359] ? smp_reschedule_interrupt+0x109/0x650 [ 894.610360] ? smp_call_function_single_interrupt+0x650/0x650 [ 894.616226] ? interrupt_entry+0xb5/0xf0 [ 894.620273] ? trace_hardirqs_off_caller+0xbb/0x310 [ 894.625272] ? trace_hardirqs_off_caller+0xbb/0x310 [ 894.630275] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 894.635101] ? trace_hardirqs_on_caller+0x310/0x310 [ 894.640105] ? trace_hardirqs_on_caller+0x310/0x310 [ 894.645110] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 894.650634] ? check_preemption_disabled+0x48/0x200 [ 894.655638] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 894.661185] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 894.666018] apic_timer_interrupt+0xf/0x20 [ 894.670233] [ 894.672456] RIP: 0010:_raw_spin_unlock_irqrestore+0xaf/0xd0 [ 894.678871] Code: 08 f2 31 89 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 75 28 48 83 3d 60 c4 81 01 00 74 15 48 89 df 57 9d <0f> 1f 44 00 00 eb ad e8 ec 4f 50 f9 eb bb 0f 0b 0f 0b e8 5a e8 11 [ 894.697761] RSP: 0018:ffff880181ff5bf0 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 [ 894.705464] RAX: dffffc0000000000 RBX: 0000000000000286 RCX: ffffffff8184c1ba [ 894.712717] RDX: 1ffffffff1263e41 RSI: ffffffff8184c1d4 RDI: 0000000000000286 [ 894.719971] RBP: ffff880181ff5c00 R08: ffff8801d2ed0080 R09: fffffbfff160f1e5 [ 894.727225] R10: fffffbfff160f1e5 R11: ffffffff8b078f2b R12: ffffffff8b078f28 [ 894.734492] R13: 0000000000000000 R14: dffffc0000000000 R15: ffffffff8b078f28 [ 894.741781] ? trace_hardirqs_on+0x9a/0x310 [ 894.746098] ? trace_hardirqs_on+0xb4/0x310 [ 894.750413] debug_check_no_obj_freed+0x305/0x58d [ 894.755246] ? free_obj_work+0xb80/0xb80 [ 894.759305] __free_pages_ok+0x44b/0x1660 [ 894.763443] ? free_one_page+0x1700/0x1700 [ 894.767663] ? trace_hardirqs_on+0xbd/0x310 [ 894.771980] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 894.777517] ? check_preemption_disabled+0x48/0x200 [ 894.782533] ? debug_smp_processor_id+0x1c/0x20 [ 894.787186] ? perf_trace_lock+0x14d/0x7a0 [ 894.791410] ? zap_class+0x640/0x640 [ 894.795115] ? check_preemption_disabled+0x48/0x200 [ 894.800122] ? debug_smp_processor_id+0x1c/0x20 [ 894.804861] ? zap_class+0x640/0x640 [ 894.808562] ? zap_class+0x640/0x640 [ 894.812264] ? free_transhuge_page+0x302/0x490 [ 894.816834] ? lock_downgrade+0x900/0x900 [ 894.820970] ? __page_frag_cache_drain+0x200/0x200 [ 894.825890] ? trace_hardirqs_on+0xbd/0x310 [ 894.830197] ? free_transhuge_page+0x302/0x490 [ 894.834771] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 894.840208] ? kasan_check_write+0x14/0x20 [ 894.844439] ? do_raw_spin_lock+0xc1/0x200 [ 894.848661] free_compound_page+0x62/0x90 [ 894.852797] free_transhuge_page+0x30a/0x490 [ 894.857187] ? lock_downgrade+0x900/0x900 [ 894.861321] ? split_huge_pages_set+0xa90/0xa90 [ 894.865976] ? kasan_check_read+0x11/0x20 [ 894.870120] ? release_pages+0xa5b/0x26a0 [ 894.874258] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 894.879701] ? __this_cpu_preempt_check+0x1c/0x1f [ 894.884539] __put_compound_page+0x96/0xe0 [ 894.888756] release_pages+0xa68/0x26a0 [ 894.892727] ? put_pages_list+0x550/0x550 [ 894.896861] ? check_preemption_disabled+0x48/0x200 [ 894.901864] ? debug_smp_processor_id+0x1c/0x20 [ 894.906517] ? perf_trace_lock+0x14d/0x7a0 [ 894.910735] ? debug_smp_processor_id+0x1c/0x20 [ 894.915406] ? perf_trace_lock+0x14d/0x7a0 [ 894.919625] ? zap_class+0x640/0x640 [ 894.923323] ? zap_class+0x640/0x640 [ 894.927023] ? zap_class+0x640/0x640 [ 894.930727] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 894.935732] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 894.940483] ? lock_acquire+0x1ed/0x520 [ 894.944444] ? zap_class+0x640/0x640 [ 894.948145] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 894.953670] ? perf_trace_lock+0x14d/0x7a0 [ 894.957894] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 894.963679] ? zap_class+0x640/0x640 [ 894.967383] ? trace_hardirqs_off+0xb8/0x310 [ 894.971789] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 894.977321] ? __phys_addr+0xa6/0x120 [ 894.981109] ? switch_mm_irqs_off+0x8d7/0x1620 [ 894.985680] ? load_new_mm_cr3+0x200/0x200 [ 894.989901] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 894.995432] ? zap_class+0x640/0x640 [ 894.999130] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 895.004657] ? lock_downgrade+0x900/0x900 [ 895.008789] ? __page_mapcount+0x580/0x580 [ 895.013015] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 895.018800] ? vma_kernel_pagesize+0xb0/0xb0 [ 895.023200] ? flush_tlb_func_common.constprop.16+0x600/0xd10 [ 895.029072] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 895.034594] ? check_preemption_disabled+0x48/0x200 [ 895.039596] ? do_raw_spin_unlock+0xa7/0x2f0 [ 895.043996] ? debug_smp_processor_id+0x1c/0x20 [ 895.048654] ? perf_trace_lock+0x14d/0x7a0 [ 895.052884] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 895.058410] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 895.063941] ? lru_add_drain_cpu+0x1c0/0x500 [ 895.068444] free_pages_and_swap_cache+0x475/0x6f0 [ 895.073363] ? free_page_and_swap_cache+0x950/0x950 [ 895.078366] ? zap_class+0x640/0x640 [ 895.082066] ? unmap_page_range+0x1867/0x2030 [ 895.086549] ? lock_downgrade+0x900/0x900 [ 895.090686] ? kasan_check_read+0x11/0x20 [ 895.094823] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 895.099394] ? __pte_alloc_kernel+0x220/0x220 [ 895.103878] tlb_flush_mmu_free+0xff/0x1b0 [ 895.108098] unmap_page_range+0x1873/0x2030 [ 895.112416] ? vm_normal_page_pmd+0x2f0/0x2f0 [ 895.116902] ? is_bpf_text_address+0xd3/0x170 [ 895.121382] ? kernel_text_address+0x79/0xf0 [ 895.125775] ? __kernel_text_address+0xd/0x40 [ 895.130256] ? unwind_get_return_address+0x61/0xa0 [ 895.135181] ? save_stack+0xa9/0xd0 [ 895.138796] ? __kasan_slab_free+0x102/0x150 [ 895.143189] ? kasan_slab_free+0xe/0x10 [ 895.147149] ? kmem_cache_free+0x83/0x290 [ 895.151285] ? __khugepaged_exit+0x429/0x6a0 [ 895.155675] ? mmput+0x4dc/0x610 [ 895.159025] ? do_exit+0xe6f/0x2610 [ 895.162637] ? do_group_exit+0x177/0x440 [ 895.166684] ? get_signal+0x8b0/0x1980 [ 895.170555] ? do_signal+0x9c/0x21e0 [ 895.174261] ? exit_to_usermode_loop+0x2e5/0x380 [ 895.179002] ? do_syscall_64+0x6be/0x820 [ 895.183056] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 895.188414] ? trace_hardirqs_off+0xb8/0x310 [ 895.192809] ? kasan_check_read+0x11/0x20 [ 895.196949] ? do_raw_spin_unlock+0xa7/0x2f0 [ 895.201348] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 895.206869] ? uprobe_munmap+0x14c/0x450 [ 895.210916] ? uprobe_mmap+0xd50/0xd50 [ 895.214794] ? trace_hardirqs_off+0xb8/0x310 [ 895.219191] ? debug_check_no_obj_freed+0x305/0x58d [ 895.224205] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 895.229737] ? check_preemption_disabled+0x48/0x200 [ 895.234755] unmap_single_vma+0x19b/0x310 [ 895.238895] unmap_vmas+0x125/0x200 [ 895.242522] exit_mmap+0x2be/0x590 [ 895.246061] ? __ia32_sys_munmap+0x80/0x80 [ 895.250281] ? __khugepaged_exit+0x455/0x6a0 [ 895.254686] ? __might_sleep+0x95/0x190 [ 895.258645] mmput+0x247/0x610 [ 895.261826] ? lock_downgrade+0x900/0x900 [ 895.265959] ? set_mm_exe_file+0x200/0x200 [ 895.270193] ? kasan_check_read+0x11/0x20 [ 895.274328] ? do_raw_spin_unlock+0xa7/0x2f0 [ 895.278722] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 895.283305] ? kasan_check_write+0x14/0x20 [ 895.287527] ? do_raw_spin_lock+0xc1/0x200 [ 895.291759] do_exit+0xe6f/0x2610 [ 895.295204] ? __bpf_trace_preemptirq_template+0x11/0x30 [ 895.300639] ? mm_update_next_owner+0x990/0x990 [ 895.305291] ? zap_class+0x640/0x640 [ 895.308991] ? debug_object_active_state+0x2f5/0x4d0 [ 895.314079] ? lock_downgrade+0x900/0x900 [ 895.318218] ? trace_hardirqs_on+0xbd/0x310 [ 895.322526] ? kasan_check_read+0x11/0x20 [ 895.326661] ? mark_held_locks+0x130/0x130 [ 895.330878] ? kasan_check_write+0x14/0x20 [ 895.335100] ? do_raw_spin_lock+0xc1/0x200 [ 895.339327] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 895.344851] ? check_preemption_disabled+0x48/0x200 [ 895.349853] ? mark_held_locks+0x130/0x130 [ 895.354076] ? debug_smp_processor_id+0x1c/0x20 [ 895.358737] ? perf_trace_lock+0x14d/0x7a0 [ 895.362966] ? check_preemption_disabled+0x48/0x200 [ 895.367969] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 895.373493] ? check_preemption_disabled+0x48/0x200 [ 895.378495] ? debug_smp_processor_id+0x1c/0x20 [ 895.383147] ? perf_trace_lock+0x14d/0x7a0 [ 895.387366] ? trace_hardirqs_on+0xbd/0x310 [ 895.391672] ? zap_class+0x640/0x640 [ 895.395375] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 895.400897] ? check_preemption_disabled+0x48/0x200 [ 895.405904] ? zap_class+0x640/0x640 [ 895.409602] ? memset+0x31/0x40 [ 895.412882] ? __dequeue_signal+0xf9/0x7d0 [ 895.417108] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 895.422636] ? zap_class+0x640/0x640 [ 895.426350] ? get_signal+0x95b/0x1980 [ 895.430224] ? lock_downgrade+0x900/0x900 [ 895.434366] ? do_raw_spin_lock+0xc1/0x200 [ 895.438592] do_group_exit+0x177/0x440 [ 895.442470] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 895.447918] ? __ia32_sys_exit+0x50/0x50 [ 895.451963] ? kasan_check_write+0x14/0x20 [ 895.456184] ? do_raw_spin_lock+0xc1/0x200 [ 895.460412] get_signal+0x8b0/0x1980 [ 895.464119] ? ptrace_notify+0x130/0x130 [ 895.468168] ? zap_class+0x640/0x640 [ 895.471869] ? __f_unlock_pos+0x19/0x20 [ 895.475832] ? __fget+0x4d1/0x740 [ 895.479276] do_signal+0x9c/0x21e0 [ 895.482817] ? setup_sigcontext+0x7d0/0x7d0 [ 895.487124] ? blkdev_fallocate+0x400/0x400 [ 895.491437] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 895.496973] ? do_vfs_ioctl+0x201/0x1720 [ 895.501024] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 895.506562] ? check_preemption_disabled+0x48/0x200 [ 895.511574] ? cpumask_weight.constprop.5+0x3f/0x3f [ 895.516573] ? fput+0x130/0x1a0 [ 895.519845] exit_to_usermode_loop+0x2e5/0x380 [ 895.524419] ? syscall_slow_exit_work+0x520/0x520 [ 895.529247] ? ksys_ioctl+0x81/0xd0 [ 895.532868] do_syscall_64+0x6be/0x820 [ 895.536739] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 895.542091] ? syscall_return_slowpath+0x5e0/0x5e0 [ 895.547004] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 895.551835] ? trace_hardirqs_on_caller+0x310/0x310 [ 895.556838] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 895.561845] ? prepare_exit_to_usermode+0x291/0x3b0 [ 895.566855] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 895.571687] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 895.576867] RIP: 0033:0x457579 [ 895.580048] Code: Bad RIP value. [ 895.583395] RSP: 002b:00007f77b8522c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 895.591088] RAX: 0000000000000000 RBX: 00007f77b8522c90 RCX: 0000000000457579 [ 895.598357] RDX: 00000000200006c0 RSI: 0000000000001269 RDI: 0000000000000003 [ 895.605611] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 895.612967] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f77b85236d4 [ 895.620225] R13: 00000000004be93a R14: 00000000004ce5f0 R15: 0000000000000004 [ 895.627589] BUG: sleeping function called from invalid context at mm/slab.h:421 [ 895.635155] in_atomic(): 1, irqs_disabled(): 0, pid: 16561, name: syz-executor4 [ 895.642643] INFO: lockdep is turned off. [ 895.646712] Preemption disabled at: [ 895.646734] [] debug_check_no_obj_freed+0x17a/0x58d [ 895.656971] CPU: 1 PID: 16561 Comm: syz-executor4 Tainted: G W 4.19.0-rc6+ #45 [ 895.665629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 895.674964] Call Trace: [ 895.677528] [ 895.679670] dump_stack+0x1c4/0x2b4 [ 895.683295] ? dump_stack_print_info.cold.2+0x52/0x52 [ 895.688471] ? fs_reclaim_acquire+0x20/0x20 [ 895.692777] ? vprintk_func+0x85/0x181 [ 895.696646] ? vprintk_func+0x85/0x181 [ 895.700520] ? debug_check_no_obj_freed+0x17a/0x58d [ 895.705526] ___might_sleep.cold.82+0x1ba/0x1f3 [ 895.710182] ? vprintk_func+0x85/0x181 [ 895.714072] ? arch_local_save_flags+0x40/0x40 [ 895.718642] ? add_taint+0x29/0x70 [ 895.722169] ? debug_check_no_obj_freed+0x17a/0x58d [ 895.727178] __might_sleep+0x95/0x190 [ 895.730972] __kmalloc+0x2ca/0x760 [ 895.734511] ? kobject_get_path+0xc2/0x1b0 [ 895.738729] ? kmem_cache_alloc_trace+0x31f/0x750 [ 895.743558] kobject_get_path+0xc2/0x1b0 [ 895.747611] kobject_uevent_env+0x314/0x101e [ 895.752007] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 895.756767] kobject_uevent+0x1f/0x24 [ 895.760554] kobject_put.cold.9+0x170/0x2e4 [ 895.764866] put_device+0x20/0x30 [ 895.768319] delete_partition_rcu_cb+0x147/0x1b0 [ 895.773063] ? read_dev_sector+0x4f0/0x4f0 [ 895.777288] rcu_process_callbacks+0xf23/0x2670 [ 895.781948] ? __rcu_read_unlock+0x2f0/0x2f0 [ 895.786349] ? zap_class+0x640/0x640 [ 895.790064] ? __run_timers+0xa20/0xc70 [ 895.794026] ? mark_held_locks+0x130/0x130 [ 895.798253] ? trace_hardirqs_on+0xbd/0x310 [ 895.802558] ? kasan_check_read+0x11/0x20 [ 895.806705] ? __run_timers+0xa20/0xc70 [ 895.810685] ? kasan_check_write+0x14/0x20 [ 895.814911] ? _raw_spin_unlock_irq+0x60/0x80 [ 895.819401] ? __run_timers+0xa4a/0xc70 [ 895.823370] ? __bpf_trace_timer_expire_entry+0x30/0x30 [ 895.828727] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 895.833733] ? timerqueue_add+0x207/0x2b0 [ 895.837882] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 895.843419] ? check_preemption_disabled+0x48/0x200 [ 895.849446] ? enqueue_hrtimer+0x1a5/0x560 [ 895.853673] ? debug_smp_processor_id+0x1c/0x20 [ 895.858357] ? perf_trace_lock+0x14d/0x7a0 [ 895.862579] ? trace_hardirqs_on+0x310/0x310 [ 895.866977] ? pvclock_read_flags+0x160/0x160 [ 895.871458] ? lock_downgrade+0x900/0x900 [ 895.875597] ? trace_hardirqs_on+0xbd/0x310 [ 895.879902] ? kvm_sched_clock_read+0x9/0x20 [ 895.884294] ? irq_exit+0x17f/0x1c0 [ 895.887913] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 895.893439] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 895.898971] ? check_preemption_disabled+0x48/0x200 [ 895.903979] __do_softirq+0x30b/0xad8 [ 895.907776] ? __irqentry_text_end+0x1f9618/0x1f9618 [ 895.912870] ? pvclock_read_flags+0x160/0x160 [ 895.917350] ? lapic_next_event+0x5a/0x90 [ 895.921485] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 895.927011] ? clockevents_program_event+0x140/0x370 [ 895.932105] ? kvm_clock_read+0x18/0x30 [ 895.936080] ? kvm_sched_clock_read+0x9/0x20 [ 895.940477] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 895.946001] ? check_preemption_disabled+0x48/0x200 [ 895.951012] irq_exit+0x17f/0x1c0 [ 895.954457] smp_apic_timer_interrupt+0x1cb/0x760 [ 895.959289] ? smp_reschedule_interrupt+0x109/0x650 [ 895.964292] ? smp_call_function_single_interrupt+0x650/0x650 [ 895.970163] ? interrupt_entry+0xb5/0xf0 [ 895.974216] ? trace_hardirqs_off_caller+0xbb/0x310 [ 895.979230] ? trace_hardirqs_off_caller+0xbb/0x310 [ 895.984238] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 895.989067] ? trace_hardirqs_on_caller+0x310/0x310 [ 895.994073] ? trace_hardirqs_on_caller+0x310/0x310 [ 895.999089] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 896.004614] ? check_preemption_disabled+0x48/0x200 [ 896.009618] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 896.015148] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 896.019985] apic_timer_interrupt+0xf/0x20 [ 896.024205] [ 896.026432] RIP: 0010:_raw_spin_unlock_irqrestore+0xaf/0xd0 [ 896.032135] Code: 08 f2 31 89 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 75 28 48 83 3d 60 c4 81 01 00 74 15 48 89 df 57 9d <0f> 1f 44 00 00 eb ad e8 ec 4f 50 f9 eb bb 0f 0b 0f 0b e8 5a e8 11 [ 896.051039] RSP: 0018:ffff880181ff5bf0 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 [ 896.058763] RAX: dffffc0000000000 RBX: 0000000000000286 RCX: ffffffff8184c1ba [ 896.066021] RDX: 1ffffffff1263e41 RSI: ffffffff8184c1d4 RDI: 0000000000000286 [ 896.073291] RBP: ffff880181ff5c00 R08: ffff8801d2ed0080 R09: fffffbfff160f1e5 [ 896.080560] R10: fffffbfff160f1e5 R11: ffffffff8b078f2b R12: ffffffff8b078f28 [ 896.087828] R13: 0000000000000000 R14: dffffc0000000000 R15: ffffffff8b078f28 [ 896.095105] ? trace_hardirqs_on+0x9a/0x310 [ 896.099414] ? trace_hardirqs_on+0xb4/0x310 [ 896.103727] debug_check_no_obj_freed+0x305/0x58d [ 896.108560] ? free_obj_work+0xb80/0xb80 [ 896.112617] __free_pages_ok+0x44b/0x1660 [ 896.116756] ? free_one_page+0x1700/0x1700 [ 896.120979] ? trace_hardirqs_on+0xbd/0x310 [ 896.125288] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 896.130814] ? check_preemption_disabled+0x48/0x200 [ 896.135835] ? debug_smp_processor_id+0x1c/0x20 [ 896.140493] ? perf_trace_lock+0x14d/0x7a0 [ 896.144719] ? zap_class+0x640/0x640 [ 896.148430] ? check_preemption_disabled+0x48/0x200 [ 896.153438] ? debug_smp_processor_id+0x1c/0x20 [ 896.158102] ? zap_class+0x640/0x640 [ 896.161818] ? zap_class+0x640/0x640 [ 896.165519] ? free_transhuge_page+0x302/0x490 [ 896.170088] ? lock_downgrade+0x900/0x900 [ 896.174233] ? __page_frag_cache_drain+0x200/0x200 [ 896.179158] ? trace_hardirqs_on+0xbd/0x310 [ 896.183473] ? free_transhuge_page+0x302/0x490 [ 896.188044] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 896.193485] ? kasan_check_write+0x14/0x20 [ 896.197713] ? do_raw_spin_lock+0xc1/0x200 [ 896.201941] free_compound_page+0x62/0x90 [ 896.206076] free_transhuge_page+0x30a/0x490 [ 896.210468] ? lock_downgrade+0x900/0x900 [ 896.214603] ? split_huge_pages_set+0xa90/0xa90 [ 896.219263] ? kasan_check_read+0x11/0x20 [ 896.223394] ? release_pages+0xa5b/0x26a0 [ 896.227528] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 896.232971] ? __this_cpu_preempt_check+0x1c/0x1f [ 896.237817] __put_compound_page+0x96/0xe0 [ 896.242040] release_pages+0xa68/0x26a0 [ 896.246005] ? put_pages_list+0x550/0x550 [ 896.250144] ? check_preemption_disabled+0x48/0x200 [ 896.255161] ? debug_smp_processor_id+0x1c/0x20 [ 896.259825] ? perf_trace_lock+0x14d/0x7a0 [ 896.264050] ? debug_smp_processor_id+0x1c/0x20 [ 896.268705] ? perf_trace_lock+0x14d/0x7a0 [ 896.272926] ? zap_class+0x640/0x640 [ 896.276630] ? zap_class+0x640/0x640 [ 896.280340] ? zap_class+0x640/0x640 [ 896.284055] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 896.289057] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 896.293804] ? lock_acquire+0x1ed/0x520 [ 896.297768] ? zap_class+0x640/0x640 [ 896.301469] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 896.306998] ? perf_trace_lock+0x14d/0x7a0 [ 896.311218] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 896.317019] ? zap_class+0x640/0x640 [ 896.320725] ? trace_hardirqs_off+0xb8/0x310 [ 896.325123] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 896.330655] ? __phys_addr+0xa6/0x120 [ 896.334451] ? switch_mm_irqs_off+0x8d7/0x1620 [ 896.339023] ? load_new_mm_cr3+0x200/0x200 [ 896.343246] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 896.348773] ? zap_class+0x640/0x640 [ 896.352475] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 896.358000] ? lock_downgrade+0x900/0x900 [ 896.362136] ? __page_mapcount+0x580/0x580 [ 896.366367] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 896.372159] ? vma_kernel_pagesize+0xb0/0xb0 [ 896.376573] ? flush_tlb_func_common.constprop.16+0x600/0xd10 [ 896.382463] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 896.387991] ? check_preemption_disabled+0x48/0x200 [ 896.392995] ? do_raw_spin_unlock+0xa7/0x2f0 [ 896.397394] ? debug_smp_processor_id+0x1c/0x20 [ 896.402054] ? perf_trace_lock+0x14d/0x7a0 [ 896.406282] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 896.411809] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 896.417343] ? lru_add_drain_cpu+0x1c0/0x500 [ 896.421740] free_pages_and_swap_cache+0x475/0x6f0 [ 896.426663] ? free_page_and_swap_cache+0x950/0x950 [ 896.431673] ? zap_class+0x640/0x640 [ 896.435379] ? unmap_page_range+0x1867/0x2030 [ 896.439868] ? lock_downgrade+0x900/0x900 [ 896.444008] ? kasan_check_read+0x11/0x20 [ 896.448150] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 896.452720] ? __pte_alloc_kernel+0x220/0x220 [ 896.457202] tlb_flush_mmu_free+0xff/0x1b0 [ 896.461430] unmap_page_range+0x1873/0x2030 [ 896.465750] ? vm_normal_page_pmd+0x2f0/0x2f0 [ 896.470241] ? is_bpf_text_address+0xd3/0x170 [ 896.474726] ? kernel_text_address+0x79/0xf0 [ 896.479121] ? __kernel_text_address+0xd/0x40 [ 896.483613] ? unwind_get_return_address+0x61/0xa0 [ 896.488547] ? save_stack+0xa9/0xd0 [ 896.492166] ? __kasan_slab_free+0x102/0x150 [ 896.496561] ? kasan_slab_free+0xe/0x10 [ 896.500522] ? kmem_cache_free+0x83/0x290 [ 896.504662] ? __khugepaged_exit+0x429/0x6a0 [ 896.509054] ? mmput+0x4dc/0x610 [ 896.512405] ? do_exit+0xe6f/0x2610 [ 896.516015] ? do_group_exit+0x177/0x440 [ 896.520062] ? get_signal+0x8b0/0x1980 [ 896.523936] ? do_signal+0x9c/0x21e0 [ 896.527646] ? exit_to_usermode_loop+0x2e5/0x380 [ 896.532396] ? do_syscall_64+0x6be/0x820 [ 896.536445] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 896.541799] ? trace_hardirqs_off+0xb8/0x310 [ 896.546200] ? kasan_check_read+0x11/0x20 [ 896.550339] ? do_raw_spin_unlock+0xa7/0x2f0 [ 896.554734] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 896.560268] ? uprobe_munmap+0x14c/0x450 [ 896.564316] ? uprobe_mmap+0xd50/0xd50 [ 896.568192] ? trace_hardirqs_off+0xb8/0x310 [ 896.572593] ? debug_check_no_obj_freed+0x305/0x58d [ 896.577690] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 896.583217] ? check_preemption_disabled+0x48/0x200 [ 896.588256] unmap_single_vma+0x19b/0x310 [ 896.592398] unmap_vmas+0x125/0x200 [ 896.596012] exit_mmap+0x2be/0x590 [ 896.599536] ? __ia32_sys_munmap+0x80/0x80 [ 896.603756] ? __khugepaged_exit+0x455/0x6a0 [ 896.608168] ? __might_sleep+0x95/0x190 [ 896.612136] mmput+0x247/0x610 [ 896.615319] ? lock_downgrade+0x900/0x900 [ 896.619454] ? set_mm_exe_file+0x200/0x200 [ 896.623686] ? kasan_check_read+0x11/0x20 [ 896.627826] ? do_raw_spin_unlock+0xa7/0x2f0 [ 896.632221] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 896.636788] ? kasan_check_write+0x14/0x20 [ 896.641009] ? do_raw_spin_lock+0xc1/0x200 [ 896.645235] do_exit+0xe6f/0x2610 [ 896.648681] ? __bpf_trace_preemptirq_template+0x11/0x30 [ 896.654124] ? mm_update_next_owner+0x990/0x990 [ 896.658780] ? zap_class+0x640/0x640 [ 896.662497] ? debug_object_active_state+0x2f5/0x4d0 [ 896.667593] ? lock_downgrade+0x900/0x900 [ 896.671740] ? trace_hardirqs_on+0xbd/0x310 [ 896.676043] ? kasan_check_read+0x11/0x20 [ 896.680575] ? mark_held_locks+0x130/0x130 [ 896.684808] ? kasan_check_write+0x14/0x20 [ 896.689027] ? do_raw_spin_lock+0xc1/0x200 [ 896.693253] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 896.698777] ? check_preemption_disabled+0x48/0x200 [ 896.703780] ? mark_held_locks+0x130/0x130 [ 896.708011] ? debug_smp_processor_id+0x1c/0x20 [ 896.712668] ? perf_trace_lock+0x14d/0x7a0 [ 896.716889] ? check_preemption_disabled+0x48/0x200 [ 896.721898] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 896.727429] ? check_preemption_disabled+0x48/0x200 [ 896.732439] ? debug_smp_processor_id+0x1c/0x20 [ 896.737093] ? perf_trace_lock+0x14d/0x7a0 [ 896.741316] ? trace_hardirqs_on+0xbd/0x310 [ 896.745627] ? zap_class+0x640/0x640 [ 896.749333] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 896.754863] ? check_preemption_disabled+0x48/0x200 [ 896.759869] ? zap_class+0x640/0x640 [ 896.763832] ? memset+0x31/0x40 [ 896.767103] ? __dequeue_signal+0xf9/0x7d0 [ 896.771332] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 896.776858] ? zap_class+0x640/0x640 [ 896.780563] ? get_signal+0x95b/0x1980 [ 896.784436] ? lock_downgrade+0x900/0x900 [ 896.788573] ? do_raw_spin_lock+0xc1/0x200 [ 896.792808] do_group_exit+0x177/0x440 [ 896.796690] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 896.802131] ? __ia32_sys_exit+0x50/0x50 [ 896.806179] ? kasan_check_write+0x14/0x20 [ 896.810405] ? do_raw_spin_lock+0xc1/0x200 [ 896.814630] get_signal+0x8b0/0x1980 [ 896.818336] ? ptrace_notify+0x130/0x130 [ 896.822721] ? zap_class+0x640/0x640 [ 896.826426] ? __f_unlock_pos+0x19/0x20 [ 896.830390] ? __fget+0x4d1/0x740 [ 896.833835] do_signal+0x9c/0x21e0 [ 896.837365] ? setup_sigcontext+0x7d0/0x7d0 [ 896.841674] ? blkdev_fallocate+0x400/0x400 [ 896.846165] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 896.851692] ? do_vfs_ioctl+0x201/0x1720 [ 896.855745] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 896.861272] ? check_preemption_disabled+0x48/0x200 [ 896.866284] ? cpumask_weight.constprop.5+0x3f/0x3f [ 896.871299] ? fput+0x130/0x1a0 [ 896.874577] exit_to_usermode_loop+0x2e5/0x380 [ 896.879168] ? syscall_slow_exit_work+0x520/0x520 [ 896.884015] ? ksys_ioctl+0x81/0xd0 [ 896.887633] do_syscall_64+0x6be/0x820 [ 896.891522] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 896.896875] ? syscall_return_slowpath+0x5e0/0x5e0 [ 896.901793] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 896.906629] ? trace_hardirqs_on_caller+0x310/0x310 [ 896.911645] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 896.916658] ? prepare_exit_to_usermode+0x291/0x3b0 [ 896.921677] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 896.926516] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 896.931703] RIP: 0033:0x457579 [ 896.934886] Code: Bad RIP value. [ 896.938244] RSP: 002b:00007f77b8522c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 896.945938] RAX: 0000000000000000 RBX: 00007f77b8522c90 RCX: 0000000000457579 [ 896.953191] RDX: 00000000200006c0 RSI: 0000000000001269 RDI: 0000000000000003 [ 896.960447] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 896.967705] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f77b85236d4 [ 896.974962] R13: 00000000004be93a R14: 00000000004ce5f0 R15: 0000000000000004 [ 896.982306] BUG: sleeping function called from invalid context at mm/slab.c:3066 [ 896.989870] in_atomic(): 1, irqs_disabled(): 0, pid: 16561, name: syz-executor4 [ 896.997339] INFO: lockdep is turned off. [ 897.001429] Preemption disabled at: [ 897.001452] [] debug_check_no_obj_freed+0x17a/0x58d [ 897.011685] CPU: 1 PID: 16561 Comm: syz-executor4 Tainted: G W 4.19.0-rc6+ #45 [ 897.020339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 897.029682] Call Trace: [ 897.032248] [ 897.034391] dump_stack+0x1c4/0x2b4 [ 897.038007] ? dump_stack_print_info.cold.2+0x52/0x52 [ 897.043186] ? vprintk_func+0x85/0x181 [ 897.047057] ? vprintk_func+0x85/0x181 [ 897.050928] ? debug_check_no_obj_freed+0x17a/0x58d [ 897.055950] ___might_sleep.cold.82+0x1ba/0x1f3 [ 897.060614] ? vprintk_func+0x85/0x181 [ 897.064493] ? arch_local_save_flags+0x40/0x40 [ 897.069061] ? add_taint+0x29/0x70 [ 897.072592] ? debug_check_no_obj_freed+0x17a/0x58d [ 897.077601] __might_sleep+0x95/0x190 [ 897.081387] ? __should_failslab+0x12b/0x180 [ 897.085784] __kmalloc+0x304/0x760 [ 897.089310] ? kobject_get_path+0xc2/0x1b0 [ 897.093530] ? kmem_cache_alloc_trace+0x31f/0x750 [ 897.098359] kobject_get_path+0xc2/0x1b0 [ 897.102411] kobject_uevent_env+0x314/0x101e [ 897.106802] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 897.111546] kobject_uevent+0x1f/0x24 [ 897.115353] kobject_put.cold.9+0x170/0x2e4 [ 897.119661] put_device+0x20/0x30 [ 897.123101] delete_partition_rcu_cb+0x147/0x1b0 [ 897.127842] ? read_dev_sector+0x4f0/0x4f0 [ 897.132062] rcu_process_callbacks+0xf23/0x2670 [ 897.136722] ? __rcu_read_unlock+0x2f0/0x2f0 [ 897.141122] ? zap_class+0x640/0x640 [ 897.144827] ? __run_timers+0xa20/0xc70 [ 897.148788] ? mark_held_locks+0x130/0x130 [ 897.153012] ? trace_hardirqs_on+0xbd/0x310 [ 897.157314] ? kasan_check_read+0x11/0x20 [ 897.161456] ? __run_timers+0xa20/0xc70 [ 897.165415] ? kasan_check_write+0x14/0x20 [ 897.169636] ? _raw_spin_unlock_irq+0x60/0x80 [ 897.174116] ? __run_timers+0xa4a/0xc70 [ 897.178086] ? __bpf_trace_timer_expire_entry+0x30/0x30 [ 897.183435] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 897.188451] ? timerqueue_add+0x207/0x2b0 [ 897.192591] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 897.198118] ? check_preemption_disabled+0x48/0x200 [ 897.203116] ? enqueue_hrtimer+0x1a5/0x560 [ 897.207349] ? debug_smp_processor_id+0x1c/0x20 [ 897.212004] ? perf_trace_lock+0x14d/0x7a0 [ 897.216226] ? trace_hardirqs_on+0x310/0x310 [ 897.220624] ? pvclock_read_flags+0x160/0x160 [ 897.225101] ? lock_downgrade+0x900/0x900 [ 897.229241] ? trace_hardirqs_on+0xbd/0x310 [ 897.233545] ? kvm_sched_clock_read+0x9/0x20 [ 897.237947] ? irq_exit+0x17f/0x1c0 [ 897.241568] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 897.247096] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 897.252632] ? check_preemption_disabled+0x48/0x200 [ 897.257637] __do_softirq+0x30b/0xad8 [ 897.261430] ? __irqentry_text_end+0x1f9618/0x1f9618 [ 897.266520] ? pvclock_read_flags+0x160/0x160 [ 897.270999] ? lapic_next_event+0x5a/0x90 [ 897.275133] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 897.280667] ? clockevents_program_event+0x140/0x370 [ 897.285758] ? kvm_clock_read+0x18/0x30 [ 897.289719] ? kvm_sched_clock_read+0x9/0x20 [ 897.294115] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 897.299638] ? check_preemption_disabled+0x48/0x200 [ 897.304643] irq_exit+0x17f/0x1c0 [ 897.308088] smp_apic_timer_interrupt+0x1cb/0x760 [ 897.312921] ? smp_reschedule_interrupt+0x109/0x650 [ 897.317922] ? smp_call_function_single_interrupt+0x650/0x650 [ 897.323792] ? interrupt_entry+0xb5/0xf0 [ 897.327853] ? trace_hardirqs_off_caller+0xbb/0x310 [ 897.332856] ? trace_hardirqs_off_caller+0xbb/0x310 [ 897.337858] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 897.342688] ? trace_hardirqs_on_caller+0x310/0x310 [ 897.347688] ? trace_hardirqs_on_caller+0x310/0x310 [ 897.352690] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 897.358215] ? check_preemption_disabled+0x48/0x200 [ 897.363217] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 897.368744] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 897.373578] apic_timer_interrupt+0xf/0x20 [ 897.377794] [ 897.380017] RIP: 0010:_raw_spin_unlock_irqrestore+0xaf/0xd0 [ 897.385714] Code: 08 f2 31 89 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 75 28 48 83 3d 60 c4 81 01 00 74 15 48 89 df 57 9d <0f> 1f 44 00 00 eb ad e8 ec 4f 50 f9 eb bb 0f 0b 0f 0b e8 5a e8 11 [ 897.404612] RSP: 0018:ffff880181ff5bf0 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 [ 897.412306] RAX: dffffc0000000000 RBX: 0000000000000286 RCX: ffffffff8184c1ba [ 897.419561] RDX: 1ffffffff1263e41 RSI: ffffffff8184c1d4 RDI: 0000000000000286 [ 897.426826] RBP: ffff880181ff5c00 R08: ffff8801d2ed0080 R09: fffffbfff160f1e5 [ 897.434082] R10: fffffbfff160f1e5 R11: ffffffff8b078f2b R12: ffffffff8b078f28 [ 897.441334] R13: 0000000000000000 R14: dffffc0000000000 R15: ffffffff8b078f28 [ 897.448616] ? trace_hardirqs_on+0x9a/0x310 [ 897.452922] ? trace_hardirqs_on+0xb4/0x310 [ 897.457231] debug_check_no_obj_freed+0x305/0x58d [ 897.462075] ? free_obj_work+0xb80/0xb80 [ 897.466136] __free_pages_ok+0x44b/0x1660 [ 897.470270] ? free_one_page+0x1700/0x1700 [ 897.474490] ? trace_hardirqs_on+0xbd/0x310 [ 897.478798] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 897.484322] ? check_preemption_disabled+0x48/0x200 [ 897.489325] ? debug_smp_processor_id+0x1c/0x20 [ 897.493979] ? perf_trace_lock+0x14d/0x7a0 [ 897.498199] ? zap_class+0x640/0x640 [ 897.501907] ? check_preemption_disabled+0x48/0x200 [ 897.506913] ? debug_smp_processor_id+0x1c/0x20 [ 897.511575] ? zap_class+0x640/0x640 [ 897.515279] ? zap_class+0x640/0x640 [ 897.518981] ? free_transhuge_page+0x302/0x490 [ 897.523556] ? lock_downgrade+0x900/0x900 [ 897.527687] ? __page_frag_cache_drain+0x200/0x200 [ 897.532603] ? trace_hardirqs_on+0xbd/0x310 [ 897.536908] ? free_transhuge_page+0x302/0x490 [ 897.541475] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 897.546913] ? kasan_check_write+0x14/0x20 [ 897.551135] ? do_raw_spin_lock+0xc1/0x200 [ 897.555355] free_compound_page+0x62/0x90 [ 897.559491] free_transhuge_page+0x30a/0x490 [ 897.563884] ? lock_downgrade+0x900/0x900 [ 897.568018] ? split_huge_pages_set+0xa90/0xa90 [ 897.572676] ? kasan_check_read+0x11/0x20 [ 897.576806] ? release_pages+0xa5b/0x26a0 [ 897.580937] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 897.586373] ? __this_cpu_preempt_check+0x1c/0x1f [ 897.591201] __put_compound_page+0x96/0xe0 [ 897.595429] release_pages+0xa68/0x26a0 [ 897.599391] ? put_pages_list+0x550/0x550 [ 897.603535] ? check_preemption_disabled+0x48/0x200 [ 897.608550] ? debug_smp_processor_id+0x1c/0x20 [ 897.613216] ? perf_trace_lock+0x14d/0x7a0 [ 897.617435] ? debug_smp_processor_id+0x1c/0x20 [ 897.622086] ? perf_trace_lock+0x14d/0x7a0 [ 897.626304] ? zap_class+0x640/0x640 [ 897.630001] ? zap_class+0x640/0x640 [ 897.633697] ? zap_class+0x640/0x640 [ 897.637413] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 897.642415] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 897.647168] ? lock_acquire+0x1ed/0x520 [ 897.651130] ? zap_class+0x640/0x640 [ 897.654830] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 897.660355] ? perf_trace_lock+0x14d/0x7a0 [ 897.664580] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 897.670378] ? zap_class+0x640/0x640 [ 897.674079] ? trace_hardirqs_off+0xb8/0x310 [ 897.678496] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 897.684027] ? __phys_addr+0xa6/0x120 [ 897.687832] ? switch_mm_irqs_off+0x8d7/0x1620 [ 897.692398] ? load_new_mm_cr3+0x200/0x200 [ 897.696618] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 897.702144] ? zap_class+0x640/0x640 [ 897.705843] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 897.711364] ? lock_downgrade+0x900/0x900 [ 897.715496] ? __page_mapcount+0x580/0x580 [ 897.719723] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 897.725514] ? vma_kernel_pagesize+0xb0/0xb0 [ 897.729912] ? flush_tlb_func_common.constprop.16+0x600/0xd10 [ 897.735797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 897.741318] ? check_preemption_disabled+0x48/0x200 [ 897.746327] ? do_raw_spin_unlock+0xa7/0x2f0 [ 897.750728] ? debug_smp_processor_id+0x1c/0x20 [ 897.755380] ? perf_trace_lock+0x14d/0x7a0 [ 897.759614] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 897.765136] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 897.770656] ? lru_add_drain_cpu+0x1c0/0x500 [ 897.775051] free_pages_and_swap_cache+0x475/0x6f0 [ 897.779968] ? free_page_and_swap_cache+0x950/0x950 [ 897.784970] ? zap_class+0x640/0x640 [ 897.788670] ? unmap_page_range+0x1867/0x2030 [ 897.793152] ? lock_downgrade+0x900/0x900 [ 897.797287] ? kasan_check_read+0x11/0x20 [ 897.801433] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 897.806012] ? __pte_alloc_kernel+0x220/0x220 [ 897.810516] tlb_flush_mmu_free+0xff/0x1b0 [ 897.814827] unmap_page_range+0x1873/0x2030 [ 897.819146] ? vm_normal_page_pmd+0x2f0/0x2f0 [ 897.823633] ? is_bpf_text_address+0xd3/0x170 [ 897.828116] ? kernel_text_address+0x79/0xf0 [ 897.832516] ? __kernel_text_address+0xd/0x40 [ 897.836998] ? unwind_get_return_address+0x61/0xa0 [ 897.841922] ? save_stack+0xa9/0xd0 [ 897.846000] ? __kasan_slab_free+0x102/0x150 [ 897.850396] ? kasan_slab_free+0xe/0x10 [ 897.854354] ? kmem_cache_free+0x83/0x290 [ 897.858488] ? __khugepaged_exit+0x429/0x6a0 [ 897.862885] ? mmput+0x4dc/0x610 [ 897.866239] ? do_exit+0xe6f/0x2610 [ 897.869851] ? do_group_exit+0x177/0x440 [ 897.873896] ? get_signal+0x8b0/0x1980 [ 897.877765] ? do_signal+0x9c/0x21e0 [ 897.881464] ? exit_to_usermode_loop+0x2e5/0x380 [ 897.886202] ? do_syscall_64+0x6be/0x820 [ 897.890250] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 897.895606] ? trace_hardirqs_off+0xb8/0x310 [ 897.899999] ? kasan_check_read+0x11/0x20 [ 897.904137] ? do_raw_spin_unlock+0xa7/0x2f0 [ 897.908529] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 897.914062] ? uprobe_munmap+0x14c/0x450 [ 897.918108] ? uprobe_mmap+0xd50/0xd50 [ 897.921980] ? trace_hardirqs_off+0xb8/0x310 [ 897.926375] ? debug_check_no_obj_freed+0x305/0x58d [ 897.931375] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 897.936911] ? check_preemption_disabled+0x48/0x200 [ 897.941926] unmap_single_vma+0x19b/0x310 [ 897.946063] unmap_vmas+0x125/0x200 [ 897.949676] exit_mmap+0x2be/0x590 [ 897.953201] ? __ia32_sys_munmap+0x80/0x80 [ 897.957422] ? __khugepaged_exit+0x455/0x6a0 [ 897.961828] ? __might_sleep+0x95/0x190 [ 897.965786] mmput+0x247/0x610 [ 897.968964] ? lock_downgrade+0x900/0x900 [ 897.973093] ? set_mm_exe_file+0x200/0x200 [ 897.977313] ? kasan_check_read+0x11/0x20 [ 897.981448] ? do_raw_spin_unlock+0xa7/0x2f0 [ 897.985861] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 897.990430] ? kasan_check_write+0x14/0x20 [ 897.994649] ? do_raw_spin_lock+0xc1/0x200 [ 897.998882] do_exit+0xe6f/0x2610 [ 898.002326] ? __bpf_trace_preemptirq_template+0x11/0x30 [ 898.007773] ? mm_update_next_owner+0x990/0x990 [ 898.012428] ? zap_class+0x640/0x640 [ 898.016136] ? debug_object_active_state+0x2f5/0x4d0 [ 898.021228] ? lock_downgrade+0x900/0x900 [ 898.025367] ? trace_hardirqs_on+0xbd/0x310 [ 898.029676] ? kasan_check_read+0x11/0x20 [ 898.033822] ? mark_held_locks+0x130/0x130 [ 898.038043] ? kasan_check_write+0x14/0x20 [ 898.042261] ? do_raw_spin_lock+0xc1/0x200 [ 898.046490] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 898.052027] ? check_preemption_disabled+0x48/0x200 [ 898.057035] ? mark_held_locks+0x130/0x130 [ 898.061258] ? debug_smp_processor_id+0x1c/0x20 [ 898.065911] ? perf_trace_lock+0x14d/0x7a0 [ 898.070137] ? check_preemption_disabled+0x48/0x200 [ 898.075142] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 898.080663] ? check_preemption_disabled+0x48/0x200 [ 898.085668] ? debug_smp_processor_id+0x1c/0x20 [ 898.090334] ? perf_trace_lock+0x14d/0x7a0 [ 898.094557] ? trace_hardirqs_on+0xbd/0x310 [ 898.098865] ? zap_class+0x640/0x640 [ 898.102566] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 898.108088] ? check_preemption_disabled+0x48/0x200 [ 898.113095] ? zap_class+0x640/0x640 [ 898.116794] ? memset+0x31/0x40 [ 898.120062] ? __dequeue_signal+0xf9/0x7d0 [ 898.124284] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 898.129803] ? zap_class+0x640/0x640 [ 898.133505] ? get_signal+0x95b/0x1980 [ 898.137376] ? lock_downgrade+0x900/0x900 [ 898.141512] ? do_raw_spin_lock+0xc1/0x200 [ 898.145734] do_group_exit+0x177/0x440 [ 898.149607] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 898.155046] ? __ia32_sys_exit+0x50/0x50 [ 898.159089] ? kasan_check_write+0x14/0x20 [ 898.163309] ? do_raw_spin_lock+0xc1/0x200 [ 898.167531] get_signal+0x8b0/0x1980 [ 898.171234] ? ptrace_notify+0x130/0x130 [ 898.175279] ? zap_class+0x640/0x640 [ 898.178981] ? __f_unlock_pos+0x19/0x20 [ 898.182947] ? __fget+0x4d1/0x740 [ 898.186394] do_signal+0x9c/0x21e0 [ 898.189933] ? setup_sigcontext+0x7d0/0x7d0 [ 898.194239] ? blkdev_fallocate+0x400/0x400 [ 898.198548] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 898.204074] ? do_vfs_ioctl+0x201/0x1720 [ 898.208124] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 898.213659] ? check_preemption_disabled+0x48/0x200 [ 898.218668] ? cpumask_weight.constprop.5+0x3f/0x3f [ 898.223664] ? fput+0x130/0x1a0 [ 898.226932] exit_to_usermode_loop+0x2e5/0x380 [ 898.231501] ? syscall_slow_exit_work+0x520/0x520 [ 898.236330] ? ksys_ioctl+0x81/0xd0 [ 898.239943] do_syscall_64+0x6be/0x820 [ 898.243814] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 898.249164] ? syscall_return_slowpath+0x5e0/0x5e0 [ 898.254077] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 898.258904] ? trace_hardirqs_on_caller+0x310/0x310 [ 898.263905] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 898.268907] ? prepare_exit_to_usermode+0x291/0x3b0 [ 898.273912] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 898.278740] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 898.283923] RIP: 0033:0x457579 [ 898.287116] Code: Bad RIP value. [ 898.290470] RSP: 002b:00007f77b8522c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 898.298163] RAX: 0000000000000000 RBX: 00007f77b8522c90 RCX: 0000000000457579 [ 898.305417] RDX: 00000000200006c0 RSI: 0000000000001269 RDI: 0000000000000003 [ 898.312669] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 898.319923] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f77b85236d4 [ 898.327187] R13: 00000000004be93a R14: 00000000004ce5f0 R15: 0000000000000004 [ 898.334552] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:908 [ 898.343157] in_atomic(): 1, irqs_disabled(): 0, pid: 16561, name: syz-executor4 [ 898.350619] INFO: lockdep is turned off. [ 898.354671] Preemption disabled at: [ 898.354693] [] debug_check_no_obj_freed+0x17a/0x58d [ 898.365013] CPU: 1 PID: 16561 Comm: syz-executor4 Tainted: G W 4.19.0-rc6+ #45 [ 898.373668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 898.383021] Call Trace: [ 898.385595] [ 898.387751] dump_stack+0x1c4/0x2b4 [ 898.391381] ? dump_stack_print_info.cold.2+0x52/0x52 [ 898.396574] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 898.402111] ? put_dec_trunc8+0x273/0x300 [ 898.406254] ? vprintk_func+0x85/0x181 [ 898.410145] ? vprintk_func+0x85/0x181 [ 898.414033] ? debug_check_no_obj_freed+0x17a/0x58d [ 898.419047] ___might_sleep.cold.82+0x1ba/0x1f3 [ 898.423717] ? arch_local_save_flags+0x40/0x40 [ 898.428305] __might_sleep+0x95/0x190 [ 898.432100] ? set_precision+0xe0/0xe0 [ 898.435989] ? kobject_uevent_env+0x7d7/0x101e [ 898.440571] __mutex_lock+0x138/0x1700 [ 898.444461] ? kobject_uevent_env+0x7d7/0x101e [ 898.449047] ? mutex_trylock+0x2b0/0x2b0 [ 898.453106] ? pointer+0x990/0x990 [ 898.456642] ? pointer+0x990/0x990 [ 898.460185] ? vprintk_emit+0x268/0x930 [ 898.464158] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 898.469173] ? add_uevent_var+0x225/0x2f0 [ 898.473316] ? cleanup_uevent_env+0x50/0x50 [ 898.477636] ? cleanup_uevent_env+0x50/0x50 [ 898.481953] ? do_signal+0x9c/0x21e0 [ 898.485676] ? part_uevent+0xca/0x120 [ 898.489469] ? part_release+0xd0/0xd0 [ 898.493269] ? dev_uevent+0x33b/0x7d0 [ 898.497420] ? device_get_devnode+0x2d0/0x2d0 [ 898.501917] ? vprintk_func+0x85/0x181 [ 898.505802] ? add_uevent_var+0x225/0x2f0 [ 898.509964] mutex_lock_nested+0x16/0x20 [ 898.514023] ? mutex_lock_nested+0x16/0x20 [ 898.518255] kobject_uevent_env+0x7d7/0x101e [ 898.522666] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 898.527426] kobject_uevent+0x1f/0x24 [ 898.531232] kobject_put.cold.9+0x170/0x2e4 [ 898.535550] put_device+0x20/0x30 [ 898.539001] delete_partition_rcu_cb+0x147/0x1b0 [ 898.543753] ? read_dev_sector+0x4f0/0x4f0 [ 898.547991] rcu_process_callbacks+0xf23/0x2670 [ 898.552665] ? __rcu_read_unlock+0x2f0/0x2f0 [ 898.557077] ? zap_class+0x640/0x640 [ 898.560793] ? __run_timers+0xa20/0xc70 [ 898.564768] ? mark_held_locks+0x130/0x130 [ 898.569004] ? trace_hardirqs_on+0xbd/0x310 [ 898.573322] ? kasan_check_read+0x11/0x20 [ 898.577470] ? __run_timers+0xa20/0xc70 [ 898.581453] ? kasan_check_write+0x14/0x20 [ 898.585690] ? _raw_spin_unlock_irq+0x60/0x80 [ 898.590180] ? __run_timers+0xa4a/0xc70 [ 898.594162] ? __bpf_trace_timer_expire_entry+0x30/0x30 [ 898.599540] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 898.604552] ? timerqueue_add+0x207/0x2b0 [ 898.608698] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 898.614236] ? check_preemption_disabled+0x48/0x200 [ 898.619244] ? enqueue_hrtimer+0x1a5/0x560 [ 898.623477] ? debug_smp_processor_id+0x1c/0x20 [ 898.628142] ? perf_trace_lock+0x14d/0x7a0 [ 898.632370] ? trace_hardirqs_on+0x310/0x310 [ 898.636786] ? pvclock_read_flags+0x160/0x160 [ 898.641278] ? lock_downgrade+0x900/0x900 [ 898.645434] ? trace_hardirqs_on+0xbd/0x310 [ 898.649750] ? kvm_sched_clock_read+0x9/0x20 [ 898.654156] ? irq_exit+0x17f/0x1c0 [ 898.657779] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 898.663312] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 898.668847] ? check_preemption_disabled+0x48/0x200 [ 898.673864] __do_softirq+0x30b/0xad8 [ 898.678221] ? __irqentry_text_end+0x1f9618/0x1f9618 [ 898.683330] ? pvclock_read_flags+0x160/0x160 [ 898.687820] ? lapic_next_event+0x5a/0x90 [ 898.691971] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 898.697502] ? clockevents_program_event+0x140/0x370 [ 898.702592] ? kvm_clock_read+0x18/0x30 [ 898.706547] ? kvm_sched_clock_read+0x9/0x20 [ 898.710945] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 898.716486] ? check_preemption_disabled+0x48/0x200 [ 898.721494] irq_exit+0x17f/0x1c0 [ 898.724940] smp_apic_timer_interrupt+0x1cb/0x760 [ 898.729767] ? smp_reschedule_interrupt+0x109/0x650 [ 898.734780] ? smp_call_function_single_interrupt+0x650/0x650 [ 898.740648] ? interrupt_entry+0xb5/0xf0 [ 898.744697] ? trace_hardirqs_off_caller+0xbb/0x310 [ 898.749708] ? trace_hardirqs_off_caller+0xbb/0x310 [ 898.754713] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 898.759545] ? trace_hardirqs_on_caller+0x310/0x310 [ 898.764544] ? trace_hardirqs_on_caller+0x310/0x310 [ 898.769543] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 898.775064] ? check_preemption_disabled+0x48/0x200 [ 898.780063] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 898.785591] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 898.790444] apic_timer_interrupt+0xf/0x20 [ 898.794660] [ 898.796883] RIP: 0010:_raw_spin_unlock_irqrestore+0xaf/0xd0 [ 898.802597] Code: 08 f2 31 89 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 75 28 48 83 3d 60 c4 81 01 00 74 15 48 89 df 57 9d <0f> 1f 44 00 00 eb ad e8 ec 4f 50 f9 eb bb 0f 0b 0f 0b e8 5a e8 11 [ 898.821485] RSP: 0018:ffff880181ff5bf0 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 [ 898.829178] RAX: dffffc0000000000 RBX: 0000000000000286 RCX: ffffffff8184c1ba [ 898.836448] RDX: 1ffffffff1263e41 RSI: ffffffff8184c1d4 RDI: 0000000000000286 [ 898.843705] RBP: ffff880181ff5c00 R08: ffff8801d2ed0080 R09: fffffbfff160f1e5 [ 898.850972] R10: fffffbfff160f1e5 R11: ffffffff8b078f2b R12: ffffffff8b078f28 [ 898.858229] R13: 0000000000000000 R14: dffffc0000000000 R15: ffffffff8b078f28 [ 898.865497] ? trace_hardirqs_on+0x9a/0x310 [ 898.869802] ? trace_hardirqs_on+0xb4/0x310 [ 898.874114] debug_check_no_obj_freed+0x305/0x58d [ 898.878949] ? free_obj_work+0xb80/0xb80 [ 898.883001] __free_pages_ok+0x44b/0x1660 [ 898.887141] ? free_one_page+0x1700/0x1700 [ 898.891362] ? trace_hardirqs_on+0xbd/0x310 [ 898.895670] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 898.901192] ? check_preemption_disabled+0x48/0x200 [ 898.906195] ? debug_smp_processor_id+0x1c/0x20 [ 898.910852] ? perf_trace_lock+0x14d/0x7a0 [ 898.915088] ? zap_class+0x640/0x640 [ 898.918792] ? check_preemption_disabled+0x48/0x200 [ 898.923808] ? debug_smp_processor_id+0x1c/0x20 [ 898.928464] ? zap_class+0x640/0x640 [ 898.932163] ? zap_class+0x640/0x640 [ 898.935876] ? free_transhuge_page+0x302/0x490 [ 898.940445] ? lock_downgrade+0x900/0x900 [ 898.944577] ? __page_frag_cache_drain+0x200/0x200 [ 898.949493] ? trace_hardirqs_on+0xbd/0x310 [ 898.953800] ? free_transhuge_page+0x302/0x490 [ 898.958367] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 898.963801] ? kasan_check_write+0x14/0x20 [ 898.968025] ? do_raw_spin_lock+0xc1/0x200 [ 898.972248] free_compound_page+0x62/0x90 [ 898.976382] free_transhuge_page+0x30a/0x490 [ 898.980783] ? lock_downgrade+0x900/0x900 [ 898.984922] ? split_huge_pages_set+0xa90/0xa90 [ 898.989573] ? kasan_check_read+0x11/0x20 [ 898.993706] ? release_pages+0xa5b/0x26a0 [ 898.997842] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 899.003282] ? __this_cpu_preempt_check+0x1c/0x1f [ 899.008110] __put_compound_page+0x96/0xe0 [ 899.012327] release_pages+0xa68/0x26a0 [ 899.016291] ? put_pages_list+0x550/0x550 [ 899.020426] ? check_preemption_disabled+0x48/0x200 [ 899.025442] ? debug_smp_processor_id+0x1c/0x20 [ 899.030095] ? perf_trace_lock+0x14d/0x7a0 [ 899.034313] ? debug_smp_processor_id+0x1c/0x20 [ 899.038976] ? perf_trace_lock+0x14d/0x7a0 [ 899.043194] ? zap_class+0x640/0x640 [ 899.046892] ? zap_class+0x640/0x640 [ 899.050591] ? zap_class+0x640/0x640 [ 899.054295] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 899.059299] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 899.064042] ? lock_acquire+0x1ed/0x520 [ 899.068003] ? zap_class+0x640/0x640 [ 899.071701] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 899.077228] ? perf_trace_lock+0x14d/0x7a0 [ 899.081451] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 899.087234] ? zap_class+0x640/0x640 [ 899.090932] ? trace_hardirqs_off+0xb8/0x310 [ 899.095327] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 899.100850] ? __phys_addr+0xa6/0x120 [ 899.104651] ? switch_mm_irqs_off+0x8d7/0x1620 [ 899.109217] ? load_new_mm_cr3+0x200/0x200 [ 899.113436] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 899.118960] ? zap_class+0x640/0x640 [ 899.122661] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 899.128182] ? lock_downgrade+0x900/0x900 [ 899.132314] ? __page_mapcount+0x580/0x580 [ 899.136538] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 899.142322] ? vma_kernel_pagesize+0xb0/0xb0 [ 899.146718] ? flush_tlb_func_common.constprop.16+0x600/0xd10 [ 899.152590] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 899.158110] ? check_preemption_disabled+0x48/0x200 [ 899.163117] ? do_raw_spin_unlock+0xa7/0x2f0 [ 899.167512] ? debug_smp_processor_id+0x1c/0x20 [ 899.172162] ? perf_trace_lock+0x14d/0x7a0 [ 899.176394] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 899.181927] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 899.187448] ? lru_add_drain_cpu+0x1c0/0x500 [ 899.191844] free_pages_and_swap_cache+0x475/0x6f0 [ 899.196762] ? free_page_and_swap_cache+0x950/0x950 [ 899.201767] ? zap_class+0x640/0x640 [ 899.205466] ? unmap_page_range+0x1867/0x2030 [ 899.209944] ? lock_downgrade+0x900/0x900 [ 899.214081] ? kasan_check_read+0x11/0x20 [ 899.218224] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 899.222790] ? __pte_alloc_kernel+0x220/0x220 [ 899.227272] tlb_flush_mmu_free+0xff/0x1b0 [ 899.231493] unmap_page_range+0x1873/0x2030 [ 899.235811] ? vm_normal_page_pmd+0x2f0/0x2f0 [ 899.240294] ? is_bpf_text_address+0xd3/0x170 [ 899.244773] ? kernel_text_address+0x79/0xf0 [ 899.249168] ? __kernel_text_address+0xd/0x40 [ 899.253648] ? unwind_get_return_address+0x61/0xa0 [ 899.258567] ? save_stack+0xa9/0xd0 [ 899.262179] ? __kasan_slab_free+0x102/0x150 [ 899.266568] ? kasan_slab_free+0xe/0x10 [ 899.270527] ? kmem_cache_free+0x83/0x290 [ 899.274663] ? __khugepaged_exit+0x429/0x6a0 [ 899.279056] ? mmput+0x4dc/0x610 [ 899.282408] ? do_exit+0xe6f/0x2610 [ 899.286018] ? do_group_exit+0x177/0x440 [ 899.290069] ? get_signal+0x8b0/0x1980 [ 899.293941] ? do_signal+0x9c/0x21e0 [ 899.297654] ? exit_to_usermode_loop+0x2e5/0x380 [ 899.302399] ? do_syscall_64+0x6be/0x820 [ 899.306445] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 899.311796] ? trace_hardirqs_off+0xb8/0x310 [ 899.316185] ? kasan_check_read+0x11/0x20 [ 899.320321] ? do_raw_spin_unlock+0xa7/0x2f0 [ 899.324727] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 899.330261] ? uprobe_munmap+0x14c/0x450 [ 899.334308] ? uprobe_mmap+0xd50/0xd50 [ 899.338184] ? trace_hardirqs_off+0xb8/0x310 [ 899.342579] ? debug_check_no_obj_freed+0x305/0x58d [ 899.347594] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 899.353115] ? check_preemption_disabled+0x48/0x200 [ 899.358117] unmap_single_vma+0x19b/0x310 [ 899.362255] unmap_vmas+0x125/0x200 [ 899.365868] exit_mmap+0x2be/0x590 [ 899.369399] ? __ia32_sys_munmap+0x80/0x80 [ 899.373616] ? __khugepaged_exit+0x455/0x6a0 [ 899.378018] ? __might_sleep+0x95/0x190 [ 899.381980] mmput+0x247/0x610 [ 899.385167] ? lock_downgrade+0x900/0x900 [ 899.389298] ? set_mm_exe_file+0x200/0x200 [ 899.393529] ? kasan_check_read+0x11/0x20 [ 899.397662] ? do_raw_spin_unlock+0xa7/0x2f0 [ 899.402055] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 899.406620] ? kasan_check_write+0x14/0x20 [ 899.410839] ? do_raw_spin_lock+0xc1/0x200 [ 899.415064] do_exit+0xe6f/0x2610 [ 899.418505] ? __bpf_trace_preemptirq_template+0x11/0x30 [ 899.423953] ? mm_update_next_owner+0x990/0x990 [ 899.428607] ? zap_class+0x640/0x640 [ 899.432310] ? debug_object_active_state+0x2f5/0x4d0 [ 899.437401] ? lock_downgrade+0x900/0x900 [ 899.441546] ? trace_hardirqs_on+0xbd/0x310 [ 899.445862] ? kasan_check_read+0x11/0x20 [ 899.450000] ? mark_held_locks+0x130/0x130 [ 899.454218] ? kasan_check_write+0x14/0x20 [ 899.458439] ? do_raw_spin_lock+0xc1/0x200 [ 899.462672] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 899.468196] ? check_preemption_disabled+0x48/0x200 [ 899.473202] ? mark_held_locks+0x130/0x130 [ 899.477424] ? debug_smp_processor_id+0x1c/0x20 [ 899.482076] ? perf_trace_lock+0x14d/0x7a0 [ 899.486297] ? check_preemption_disabled+0x48/0x200 [ 899.491303] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 899.496826] ? check_preemption_disabled+0x48/0x200 [ 899.501828] ? debug_smp_processor_id+0x1c/0x20 [ 899.506479] ? perf_trace_lock+0x14d/0x7a0 [ 899.510702] ? trace_hardirqs_on+0xbd/0x310 [ 899.515022] ? zap_class+0x640/0x640 [ 899.518734] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 899.524258] ? check_preemption_disabled+0x48/0x200 [ 899.529264] ? zap_class+0x640/0x640 [ 899.532972] ? memset+0x31/0x40 [ 899.536238] ? __dequeue_signal+0xf9/0x7d0 [ 899.540461] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 899.545992] ? zap_class+0x640/0x640 [ 899.549696] ? get_signal+0x95b/0x1980 [ 899.553568] ? lock_downgrade+0x900/0x900 [ 899.557700] ? do_raw_spin_lock+0xc1/0x200 [ 899.561926] do_group_exit+0x177/0x440 [ 899.565799] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 899.571235] ? __ia32_sys_exit+0x50/0x50 [ 899.575280] ? kasan_check_write+0x14/0x20 [ 899.579498] ? do_raw_spin_lock+0xc1/0x200 [ 899.583724] get_signal+0x8b0/0x1980 [ 899.587432] ? ptrace_notify+0x130/0x130 [ 899.591479] ? zap_class+0x640/0x640 [ 899.595178] ? __f_unlock_pos+0x19/0x20 [ 899.599140] ? __fget+0x4d1/0x740 [ 899.602584] do_signal+0x9c/0x21e0 [ 899.606113] ? setup_sigcontext+0x7d0/0x7d0 [ 899.610420] ? blkdev_fallocate+0x400/0x400 [ 899.614727] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 899.620250] ? do_vfs_ioctl+0x201/0x1720 [ 899.624307] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 899.629828] ? check_preemption_disabled+0x48/0x200 [ 899.634850] ? cpumask_weight.constprop.5+0x3f/0x3f [ 899.639860] ? fput+0x130/0x1a0 [ 899.643128] exit_to_usermode_loop+0x2e5/0x380 [ 899.647696] ? syscall_slow_exit_work+0x520/0x520 [ 899.652523] ? ksys_ioctl+0x81/0xd0 [ 899.656140] do_syscall_64+0x6be/0x820 [ 899.660012] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 899.665368] ? syscall_return_slowpath+0x5e0/0x5e0 [ 899.670296] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 899.675143] ? trace_hardirqs_on_caller+0x310/0x310 [ 899.680145] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 899.685147] ? prepare_exit_to_usermode+0x291/0x3b0 [ 899.690155] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 899.694986] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 899.700158] RIP: 0033:0x457579 [ 899.703348] Code: Bad RIP value. [ 899.706697] RSP: 002b:00007f77b8522c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 899.714476] RAX: 0000000000000000 RBX: 00007f77b8522c90 RCX: 0000000000457579 [ 899.721739] RDX: 00000000200006c0 RSI: 0000000000001269 RDI: 0000000000000003 [ 899.728995] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 899.736246] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f77b85236d4 [ 899.743499] R13: 00000000004be93a R14: 00000000004ce5f0 R15: 0000000000000004 [ 899.750805] BUG: sleeping function called from invalid context at mm/slab.h:421 [ 899.758254] in_atomic(): 1, irqs_disabled(): 0, pid: 16561, name: syz-executor4 [ 899.765718] INFO: lockdep is turned off. [ 899.769771] Preemption disabled at: [ 899.769794] [] debug_check_no_obj_freed+0x17a/0x58d [ 899.780016] CPU: 1 PID: 16561 Comm: syz-executor4 Tainted: G W 4.19.0-rc6+ #45 [ 899.788663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 899.798000] Call Trace: [ 899.800564] [ 899.802705] dump_stack+0x1c4/0x2b4 [ 899.806320] ? dump_stack_print_info.cold.2+0x52/0x52 [ 899.811505] ? fs_reclaim_acquire+0x20/0x20 [ 899.815810] ? vprintk_func+0x85/0x181 [ 899.819681] ? vprintk_func+0x85/0x181 [ 899.823554] ? debug_check_no_obj_freed+0x17a/0x58d [ 899.828560] ___might_sleep.cold.82+0x1ba/0x1f3 [ 899.833218] ? put_dec+0x3b/0xf0 [ 899.836571] ? arch_local_save_flags+0x40/0x40 [ 899.841137] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 899.847629] ? number+0x972/0xca0 [ 899.851078] __might_sleep+0x95/0x190 [ 899.854868] kmem_cache_alloc_node+0x264/0x730 [ 899.859432] ? set_precision+0xe0/0xe0 [ 899.863314] ? do_signal+0x9c/0x21e0 [ 899.867033] __alloc_skb+0x119/0x770 [ 899.870735] ? skb_scrub_packet+0x490/0x490 [ 899.875044] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 899.880821] ? pointer+0x990/0x990 [ 899.884350] ? device_get_devnode+0x2d0/0x2d0 [ 899.888841] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 899.893850] ? netlink_has_listeners+0x2cb/0x4a0 [ 899.898590] ? netlink_tap_init_net+0x3d0/0x3d0 [ 899.903247] alloc_uevent_skb+0x84/0x1da [ 899.907293] kobject_uevent_env+0xa52/0x101e [ 899.911689] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 899.916436] kobject_uevent+0x1f/0x24 [ 899.920220] kobject_put.cold.9+0x170/0x2e4 [ 899.924529] put_device+0x20/0x30 [ 899.927975] delete_partition_rcu_cb+0x147/0x1b0 [ 899.932713] ? read_dev_sector+0x4f0/0x4f0 [ 899.936932] rcu_process_callbacks+0xf23/0x2670 [ 899.941591] ? __rcu_read_unlock+0x2f0/0x2f0 [ 899.945990] ? zap_class+0x640/0x640 [ 899.949690] ? __run_timers+0xa20/0xc70 [ 899.953648] ? mark_held_locks+0x130/0x130 [ 899.957870] ? trace_hardirqs_on+0xbd/0x310 [ 899.962174] ? kasan_check_read+0x11/0x20 [ 899.966306] ? __run_timers+0xa20/0xc70 [ 899.970274] ? kasan_check_write+0x14/0x20 [ 899.974496] ? _raw_spin_unlock_irq+0x60/0x80 [ 899.978979] ? __run_timers+0xa4a/0xc70 [ 899.982942] ? __bpf_trace_timer_expire_entry+0x30/0x30 [ 899.988292] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 899.993310] ? timerqueue_add+0x207/0x2b0 [ 899.997449] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 900.002973] ? check_preemption_disabled+0x48/0x200 [ 900.007970] ? enqueue_hrtimer+0x1a5/0x560 [ 900.012191] ? debug_smp_processor_id+0x1c/0x20 [ 900.016844] ? perf_trace_lock+0x14d/0x7a0 [ 900.021062] ? trace_hardirqs_on+0x310/0x310 [ 900.025462] ? pvclock_read_flags+0x160/0x160 [ 900.029960] ? lock_downgrade+0x900/0x900 [ 900.034108] ? trace_hardirqs_on+0xbd/0x310 [ 900.038412] ? kvm_sched_clock_read+0x9/0x20 [ 900.042805] ? irq_exit+0x17f/0x1c0 [ 900.046419] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 900.051938] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 900.057459] ? check_preemption_disabled+0x48/0x200 [ 900.062466] __do_softirq+0x30b/0xad8 [ 900.066259] ? __irqentry_text_end+0x1f9618/0x1f9618 [ 900.071347] ? pvclock_read_flags+0x160/0x160 [ 900.075830] ? lapic_next_event+0x5a/0x90 [ 900.079961] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 900.085481] ? clockevents_program_event+0x140/0x370 [ 900.090575] ? kvm_clock_read+0x18/0x30 [ 900.094533] ? kvm_sched_clock_read+0x9/0x20 [ 900.098927] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 900.104451] ? check_preemption_disabled+0x48/0x200 [ 900.109462] irq_exit+0x17f/0x1c0 [ 900.112913] smp_apic_timer_interrupt+0x1cb/0x760 [ 900.117739] ? smp_reschedule_interrupt+0x109/0x650 [ 900.122739] ? smp_call_function_single_interrupt+0x650/0x650 [ 900.128609] ? interrupt_entry+0xb5/0xf0 [ 900.132657] ? trace_hardirqs_off_caller+0xbb/0x310 [ 900.137661] ? trace_hardirqs_off_caller+0xbb/0x310 [ 900.142662] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 900.147490] ? trace_hardirqs_on_caller+0x310/0x310 [ 900.152491] ? trace_hardirqs_on_caller+0x310/0x310 [ 900.157490] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 900.163024] ? check_preemption_disabled+0x48/0x200 [ 900.168028] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 900.173554] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 900.178384] apic_timer_interrupt+0xf/0x20 [ 900.182599] [ 900.184824] RIP: 0010:_raw_spin_unlock_irqrestore+0xaf/0xd0 [ 900.190524] Code: 08 f2 31 89 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 75 28 48 83 3d 60 c4 81 01 00 74 15 48 89 df 57 9d <0f> 1f 44 00 00 eb ad e8 ec 4f 50 f9 eb bb 0f 0b 0f 0b e8 5a e8 11 [ 900.209423] RSP: 0018:ffff880181ff5bf0 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 [ 900.217127] RAX: dffffc0000000000 RBX: 0000000000000286 RCX: ffffffff8184c1ba [ 900.224381] RDX: 1ffffffff1263e41 RSI: ffffffff8184c1d4 RDI: 0000000000000286 [ 900.231634] RBP: ffff880181ff5c00 R08: ffff8801d2ed0080 R09: fffffbfff160f1e5 [ 900.238897] R10: fffffbfff160f1e5 R11: ffffffff8b078f2b R12: ffffffff8b078f28 [ 900.246150] R13: 0000000000000000 R14: dffffc0000000000 R15: ffffffff8b078f28 [ 900.253414] ? trace_hardirqs_on+0x9a/0x310 [ 900.257718] ? trace_hardirqs_on+0xb4/0x310 [ 900.262038] debug_check_no_obj_freed+0x305/0x58d [ 900.266869] ? free_obj_work+0xb80/0xb80 [ 900.270919] __free_pages_ok+0x44b/0x1660 [ 900.275057] ? free_one_page+0x1700/0x1700 [ 900.279295] ? trace_hardirqs_on+0xbd/0x310 [ 900.283604] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 900.289127] ? check_preemption_disabled+0x48/0x200 [ 900.294130] ? debug_smp_processor_id+0x1c/0x20 [ 900.298783] ? perf_trace_lock+0x14d/0x7a0 [ 900.303019] ? zap_class+0x640/0x640 [ 900.306734] ? check_preemption_disabled+0x48/0x200 [ 900.311739] ? debug_smp_processor_id+0x1c/0x20 [ 900.316398] ? zap_class+0x640/0x640 [ 900.320099] ? zap_class+0x640/0x640 [ 900.323803] ? free_transhuge_page+0x302/0x490 [ 900.328469] ? lock_downgrade+0x900/0x900 [ 900.332601] ? __page_frag_cache_drain+0x200/0x200 [ 900.337516] ? trace_hardirqs_on+0xbd/0x310 [ 900.341832] ? free_transhuge_page+0x302/0x490 [ 900.346397] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 900.351843] ? kasan_check_write+0x14/0x20 [ 900.356068] ? do_raw_spin_lock+0xc1/0x200 [ 900.360296] free_compound_page+0x62/0x90 [ 900.364432] free_transhuge_page+0x30a/0x490 [ 900.368824] ? lock_downgrade+0x900/0x900 [ 900.372959] ? split_huge_pages_set+0xa90/0xa90 [ 900.377614] ? kasan_check_read+0x11/0x20 [ 900.381755] ? release_pages+0xa5b/0x26a0 [ 900.385890] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 900.391332] ? __this_cpu_preempt_check+0x1c/0x1f [ 900.396159] __put_compound_page+0x96/0xe0 [ 900.400382] release_pages+0xa68/0x26a0 [ 900.404345] ? put_pages_list+0x550/0x550 [ 900.408476] ? check_preemption_disabled+0x48/0x200 [ 900.413482] ? debug_smp_processor_id+0x1c/0x20 [ 900.418133] ? perf_trace_lock+0x14d/0x7a0 [ 900.422354] ? debug_smp_processor_id+0x1c/0x20 [ 900.427013] ? perf_trace_lock+0x14d/0x7a0 [ 900.431230] ? zap_class+0x640/0x640 [ 900.434928] ? zap_class+0x640/0x640 [ 900.438625] ? zap_class+0x640/0x640 [ 900.442330] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 900.447331] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 900.452073] ? lock_acquire+0x1ed/0x520 [ 900.456033] ? zap_class+0x640/0x640 [ 900.459734] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 900.465257] ? perf_trace_lock+0x14d/0x7a0 [ 900.469488] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 900.475282] ? zap_class+0x640/0x640 [ 900.478983] ? trace_hardirqs_off+0xb8/0x310 [ 900.483378] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 900.488902] ? __phys_addr+0xa6/0x120 [ 900.492701] ? switch_mm_irqs_off+0x8d7/0x1620 [ 900.497273] ? load_new_mm_cr3+0x200/0x200 [ 900.501491] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 900.507015] ? zap_class+0x640/0x640 [ 900.510731] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 900.516264] ? lock_downgrade+0x900/0x900 [ 900.520396] ? __page_mapcount+0x580/0x580 [ 900.524620] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 900.530407] ? vma_kernel_pagesize+0xb0/0xb0 [ 900.534805] ? flush_tlb_func_common.constprop.16+0x600/0xd10 [ 900.540677] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 900.546200] ? check_preemption_disabled+0x48/0x200 [ 900.551205] ? do_raw_spin_unlock+0xa7/0x2f0 [ 900.555600] ? debug_smp_processor_id+0x1c/0x20 [ 900.560251] ? perf_trace_lock+0x14d/0x7a0 [ 900.564488] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 900.570008] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 900.575531] ? lru_add_drain_cpu+0x1c0/0x500 [ 900.579937] free_pages_and_swap_cache+0x475/0x6f0 [ 900.584855] ? free_page_and_swap_cache+0x950/0x950 [ 900.589857] ? zap_class+0x640/0x640 [ 900.593674] ? unmap_page_range+0x1867/0x2030 [ 900.598154] ? lock_downgrade+0x900/0x900 [ 900.602289] ? kasan_check_read+0x11/0x20 [ 900.606432] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 900.611010] ? __pte_alloc_kernel+0x220/0x220 [ 900.615494] tlb_flush_mmu_free+0xff/0x1b0 [ 900.619717] unmap_page_range+0x1873/0x2030 [ 900.624034] ? vm_normal_page_pmd+0x2f0/0x2f0 [ 900.628522] ? is_bpf_text_address+0xd3/0x170 [ 900.633002] ? kernel_text_address+0x79/0xf0 [ 900.637394] ? __kernel_text_address+0xd/0x40 [ 900.641875] ? unwind_get_return_address+0x61/0xa0 [ 900.646798] ? save_stack+0xa9/0xd0 [ 900.650410] ? __kasan_slab_free+0x102/0x150 [ 900.654818] ? kasan_slab_free+0xe/0x10 [ 900.658783] ? kmem_cache_free+0x83/0x290 [ 900.662916] ? __khugepaged_exit+0x429/0x6a0 [ 900.667307] ? mmput+0x4dc/0x610 [ 900.670655] ? do_exit+0xe6f/0x2610 [ 900.674269] ? do_group_exit+0x177/0x440 [ 900.678737] ? get_signal+0x8b0/0x1980 [ 900.682612] ? do_signal+0x9c/0x21e0 [ 900.686316] ? exit_to_usermode_loop+0x2e5/0x380 [ 900.691058] ? do_syscall_64+0x6be/0x820 [ 900.695105] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 900.700455] ? trace_hardirqs_off+0xb8/0x310 [ 900.704845] ? kasan_check_read+0x11/0x20 [ 900.708988] ? do_raw_spin_unlock+0xa7/0x2f0 [ 900.713379] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 900.718899] ? uprobe_munmap+0x14c/0x450 [ 900.722943] ? uprobe_mmap+0xd50/0xd50 [ 900.726824] ? trace_hardirqs_off+0xb8/0x310 [ 900.731255] ? debug_check_no_obj_freed+0x305/0x58d [ 900.736263] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 900.741785] ? check_preemption_disabled+0x48/0x200 [ 900.746787] unmap_single_vma+0x19b/0x310 [ 900.750923] unmap_vmas+0x125/0x200 [ 900.754536] exit_mmap+0x2be/0x590 [ 900.758062] ? __ia32_sys_munmap+0x80/0x80 [ 900.762280] ? __khugepaged_exit+0x455/0x6a0 [ 900.766684] ? __might_sleep+0x95/0x190 [ 900.770643] mmput+0x247/0x610 [ 900.773822] ? lock_downgrade+0x900/0x900 [ 900.777965] ? set_mm_exe_file+0x200/0x200 [ 900.782185] ? kasan_check_read+0x11/0x20 [ 900.786321] ? do_raw_spin_unlock+0xa7/0x2f0 [ 900.790714] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 900.795284] ? kasan_check_write+0x14/0x20 [ 900.799501] ? do_raw_spin_lock+0xc1/0x200 [ 900.803723] do_exit+0xe6f/0x2610 [ 900.807175] ? __bpf_trace_preemptirq_template+0x11/0x30 [ 900.812620] ? mm_update_next_owner+0x990/0x990 [ 900.817274] ? zap_class+0x640/0x640 [ 900.821238] ? debug_object_active_state+0x2f5/0x4d0 [ 900.826765] ? lock_downgrade+0x900/0x900 [ 900.830898] ? trace_hardirqs_on+0xbd/0x310 [ 900.835201] ? kasan_check_read+0x11/0x20 [ 900.839338] ? mark_held_locks+0x130/0x130 [ 900.843554] ? kasan_check_write+0x14/0x20 [ 900.847772] ? do_raw_spin_lock+0xc1/0x200 [ 900.851995] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 900.857519] ? check_preemption_disabled+0x48/0x200 [ 900.862520] ? mark_held_locks+0x130/0x130 [ 900.866750] ? debug_smp_processor_id+0x1c/0x20 [ 900.871403] ? perf_trace_lock+0x14d/0x7a0 [ 900.875622] ? check_preemption_disabled+0x48/0x200 [ 900.880626] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 900.886147] ? check_preemption_disabled+0x48/0x200 [ 900.891149] ? debug_smp_processor_id+0x1c/0x20 [ 900.895805] ? perf_trace_lock+0x14d/0x7a0 [ 900.900026] ? trace_hardirqs_on+0xbd/0x310 [ 900.904330] ? zap_class+0x640/0x640 [ 900.908029] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 900.913552] ? check_preemption_disabled+0x48/0x200 [ 900.918568] ? zap_class+0x640/0x640 [ 900.922268] ? memset+0x31/0x40 [ 900.925532] ? __dequeue_signal+0xf9/0x7d0 [ 900.929759] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 900.935301] ? zap_class+0x640/0x640 [ 900.939000] ? get_signal+0x95b/0x1980 [ 900.942887] ? lock_downgrade+0x900/0x900 [ 900.947021] ? do_raw_spin_lock+0xc1/0x200 [ 900.951253] do_group_exit+0x177/0x440 [ 900.955130] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 900.960564] ? __ia32_sys_exit+0x50/0x50 [ 900.964608] ? kasan_check_write+0x14/0x20 [ 900.968829] ? do_raw_spin_lock+0xc1/0x200 [ 900.973056] get_signal+0x8b0/0x1980 [ 900.976760] ? ptrace_notify+0x130/0x130 [ 900.980818] ? zap_class+0x640/0x640 [ 900.984520] ? __f_unlock_pos+0x19/0x20 [ 900.988480] ? __fget+0x4d1/0x740 [ 900.991933] do_signal+0x9c/0x21e0 [ 900.995463] ? setup_sigcontext+0x7d0/0x7d0 [ 900.999770] ? blkdev_fallocate+0x400/0x400 [ 901.004076] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 901.009608] ? do_vfs_ioctl+0x201/0x1720 [ 901.013655] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 901.019178] ? check_preemption_disabled+0x48/0x200 [ 901.024188] ? cpumask_weight.constprop.5+0x3f/0x3f [ 901.029191] ? fput+0x130/0x1a0 [ 901.032469] exit_to_usermode_loop+0x2e5/0x380 [ 901.037040] ? syscall_slow_exit_work+0x520/0x520 [ 901.041866] ? ksys_ioctl+0x81/0xd0 [ 901.045483] do_syscall_64+0x6be/0x820 [ 901.049360] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 901.054721] ? syscall_return_slowpath+0x5e0/0x5e0 [ 901.059637] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 901.064467] ? trace_hardirqs_on_caller+0x310/0x310 [ 901.069469] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 901.074473] ? prepare_exit_to_usermode+0x291/0x3b0 [ 901.079477] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 901.084307] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 901.089480] RIP: 0033:0x457579 [ 901.092657] Code: Bad RIP value. [ 901.096003] RSP: 002b:00007f77b8522c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 901.103698] RAX: 0000000000000000 RBX: 00007f77b8522c90 RCX: 0000000000457579 [ 901.110957] RDX: 00000000200006c0 RSI: 0000000000001269 RDI: 0000000000000003 [ 901.118214] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 901.125466] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f77b85236d4 [ 901.132718] R13: 00000000004be93a R14: 00000000004ce5f0 R15: 0000000000000004 [ 901.140034] BUG: sleeping function called from invalid context at mm/slab.c:3066 [ 901.147607] in_atomic(): 1, irqs_disabled(): 0, pid: 16561, name: syz-executor4 [ 901.155075] INFO: lockdep is turned off. [ 901.159132] Preemption disabled at: [ 901.159155] [] debug_check_no_obj_freed+0x17a/0x58d [ 901.169395] CPU: 1 PID: 16561 Comm: syz-executor4 Tainted: G W 4.19.0-rc6+ #45 [ 901.178052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 901.187384] Call Trace: [ 901.189949] [ 901.192093] dump_stack+0x1c4/0x2b4 [ 901.195709] ? dump_stack_print_info.cold.2+0x52/0x52 [ 901.200891] ? fs_reclaim_acquire+0x20/0x20 [ 901.205193] ? vprintk_func+0x85/0x181 [ 901.209071] ? vprintk_func+0x85/0x181 [ 901.212942] ? debug_check_no_obj_freed+0x17a/0x58d [ 901.217945] ___might_sleep.cold.82+0x1ba/0x1f3 [ 901.222601] ? put_dec+0x3b/0xf0 [ 901.225956] ? arch_local_save_flags+0x40/0x40 [ 901.230521] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 901.236054] ? number+0x972/0xca0 [ 901.239498] __might_sleep+0x95/0x190 [ 901.243285] ? __should_failslab+0x12b/0x180 [ 901.247678] kmem_cache_alloc_node+0x29e/0x730 [ 901.252241] ? set_precision+0xe0/0xe0 [ 901.256113] ? do_signal+0x9c/0x21e0 [ 901.259813] __alloc_skb+0x119/0x770 [ 901.263512] ? skb_scrub_packet+0x490/0x490 [ 901.267820] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 901.273597] ? pointer+0x990/0x990 [ 901.277124] ? device_get_devnode+0x2d0/0x2d0 [ 901.281608] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 901.286610] ? netlink_has_listeners+0x2cb/0x4a0 [ 901.291352] ? netlink_tap_init_net+0x3d0/0x3d0 [ 901.296006] alloc_uevent_skb+0x84/0x1da [ 901.300055] kobject_uevent_env+0xa52/0x101e [ 901.304446] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 901.309196] kobject_uevent+0x1f/0x24 [ 901.312990] kobject_put.cold.9+0x170/0x2e4 [ 901.317299] put_device+0x20/0x30 [ 901.320752] delete_partition_rcu_cb+0x147/0x1b0 [ 901.325494] ? read_dev_sector+0x4f0/0x4f0 [ 901.329720] rcu_process_callbacks+0xf23/0x2670 [ 901.334383] ? __rcu_read_unlock+0x2f0/0x2f0 [ 901.338784] ? zap_class+0x640/0x640 [ 901.342488] ? __run_timers+0xa20/0xc70 [ 901.346460] ? mark_held_locks+0x130/0x130 [ 901.350682] ? trace_hardirqs_on+0xbd/0x310 [ 901.354989] ? kasan_check_read+0x11/0x20 [ 901.359121] ? __run_timers+0xa20/0xc70 [ 901.363079] ? kasan_check_write+0x14/0x20 [ 901.367298] ? _raw_spin_unlock_irq+0x60/0x80 [ 901.371782] ? __run_timers+0xa4a/0xc70 [ 901.375746] ? __bpf_trace_timer_expire_entry+0x30/0x30 [ 901.381093] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 901.386092] ? timerqueue_add+0x207/0x2b0 [ 901.390225] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 901.395758] ? check_preemption_disabled+0x48/0x200 [ 901.400767] ? enqueue_hrtimer+0x1a5/0x560 [ 901.405094] ? debug_smp_processor_id+0x1c/0x20 [ 901.409746] ? perf_trace_lock+0x14d/0x7a0 [ 901.413968] ? trace_hardirqs_on+0x310/0x310 [ 901.418385] ? pvclock_read_flags+0x160/0x160 [ 901.422866] ? lock_downgrade+0x900/0x900 [ 901.427000] ? trace_hardirqs_on+0xbd/0x310 [ 901.431306] ? kvm_sched_clock_read+0x9/0x20