84] loop1: rw=1, want=144, limit=112 [ 2771.005329] attempt to access beyond end of device [ 2771.011640] loop1: rw=1, want=145, limit=112 [ 2771.043700] attempt to access beyond end of device 09:25:32 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0xc0189436, &(0x7f0000000000)) [ 2771.088674] loop1: rw=1, want=4241, limit=112 09:25:32 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\a', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2771.147338] XFS (loop0): SB sanity check failed [ 2771.152459] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x440/0x570, xfs_sb block 0xffffffffffffffff [ 2771.168844] attempt to access beyond end of device [ 2771.213269] loop1: rw=1, want=7129, limit=112 [ 2771.229358] XFS (loop0): Unmount and run xfs_repair [ 2771.246131] attempt to access beyond end of device [ 2771.249843] XFS (loop0): First 128 bytes of corrupted metadata buffer: 09:25:32 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0xc020660b, &(0x7f0000000000)) [ 2771.271511] loop1: rw=1, want=7158, limit=112 [ 2771.272120] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 2771.302740] attempt to access beyond end of device [ 2771.322124] loop1: rw=1, want=7159, limit=112 [ 2771.325620] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2771.333444] attempt to access beyond end of device [ 2771.339979] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 2771.339991] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 2771.340021] 00000040: 00 00 00 00 00 00 0d 89 00 00 00 00 00 00 0d 8a ................ [ 2771.340032] 00000050: 00 00 00 01 00 00 10 00 00 00 00 38 00 00 00 00 ...........8.... [ 2771.340042] 00000060: 00 00 03 5a b4 24 02 00 04 00 00 04 00 00 00 00 ...Z.$.......... [ 2771.340053] 00000070: 00 00 00 00 00 ec 00 00 0c 09 0a 02 0c 00 00 00 ................ [ 2771.389375] XFS (loop0): SB validate failed with error -117. [ 2771.399726] XFS (loop2): Mounting V4 Filesystem [ 2771.409594] XFS (loop2): totally zeroed log 09:25:33 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x1000000}) [ 2771.417930] XFS (loop2): Failed to read root inode 0x6600000000000d88, error 22 [ 2771.434064] loop1: rw=1, want=7160, limit=112 [ 2771.442160] attempt to access beyond end of device [ 2771.455412] loop1: rw=1, want=7161, limit=112 [ 2771.461901] attempt to access beyond end of device [ 2771.473288] loop1: rw=1, want=7182, limit=112 [ 2771.479902] attempt to access beyond end of device [ 2771.485051] loop1: rw=1, want=7183, limit=112 [ 2771.495485] attempt to access beyond end of device [ 2771.502824] loop1: rw=1, want=7184, limit=112 [ 2771.508246] attempt to access beyond end of device [ 2771.513379] loop1: rw=1, want=7185, limit=112 [ 2771.519821] attempt to access beyond end of device [ 2771.525237] loop1: rw=1, want=7234, limit=112 [ 2771.531293] attempt to access beyond end of device [ 2771.538470] loop1: rw=1, want=7235, limit=112 [ 2771.543195] attempt to access beyond end of device [ 2771.549054] loop1: rw=1, want=7236, limit=112 [ 2771.553750] attempt to access beyond end of device [ 2771.592242] loop1: rw=1, want=7237, limit=112 [ 2771.632930] attempt to access beyond end of device [ 2771.642547] loop1: rw=1, want=7246, limit=112 [ 2771.658160] attempt to access beyond end of device [ 2771.695303] loop1: rw=1, want=7247, limit=112 09:25:33 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\b', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:25:33 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0xfdfdffff}) [ 2771.719833] attempt to access beyond end of device [ 2771.746784] loop1: rw=1, want=7248, limit=112 [ 2771.751391] attempt to access beyond end of device [ 2771.796559] loop1: rw=1, want=7249, limit=112 [ 2771.821331] attempt to access beyond end of device [ 2771.826491] loop1: rw=1, want=11345, limit=112 [ 2771.855730] attempt to access beyond end of device [ 2771.869006] loop1: rw=1, want=15441, limit=112 [ 2771.913725] attempt to access beyond end of device [ 2771.951836] loop1: rw=1, want=19537, limit=112 [ 2772.023989] attempt to access beyond end of device [ 2772.030908] loop1: rw=1, want=23633, limit=112 [ 2772.043827] attempt to access beyond end of device [ 2772.049157] loop1: rw=1, want=27729, limit=112 [ 2772.060120] attempt to access beyond end of device [ 2772.065058] loop1: rw=1, want=31825, limit=112 [ 2772.072173] attempt to access beyond end of device [ 2772.077152] loop1: rw=1, want=32993, limit=112 09:25:34 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:25:34 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a00000001000010000000000a010000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:25:34 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0xfffffdfd}) 09:25:34 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x200000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:25:34 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000017000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:25:34 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\t', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2773.122407] attempt to access beyond end of device [ 2773.127664] loop1: rw=1, want=130, limit=112 [ 2773.138812] attempt to access beyond end of device [ 2773.147320] loop1: rw=1, want=131, limit=112 [ 2773.151933] attempt to access beyond end of device [ 2773.157115] loop1: rw=1, want=132, limit=112 [ 2773.161722] attempt to access beyond end of device [ 2773.204291] loop1: rw=1, want=133, limit=112 [ 2773.229711] attempt to access beyond end of device 09:25:34 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x100000000000000}) [ 2773.250752] loop1: rw=1, want=142, limit=112 [ 2773.262133] attempt to access beyond end of device [ 2773.270129] loop1: rw=1, want=143, limit=112 [ 2773.274813] attempt to access beyond end of device [ 2773.275236] XFS (loop0): SB sanity check failed [ 2773.283979] loop1: rw=1, want=144, limit=112 [ 2773.306656] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x440/0x570, xfs_sb block 0xffffffffffffffff [ 2773.326573] XFS (loop2): Mounting V4 Filesystem [ 2773.346414] attempt to access beyond end of device 09:25:35 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\n', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2773.353083] XFS (loop2): totally zeroed log [ 2773.377081] XFS (loop2): Failed to read root inode 0x7000000000000d88, error 22 [ 2773.390939] XFS (loop0): Unmount and run xfs_repair [ 2773.392721] loop1: rw=1, want=145, limit=112 [ 2773.411144] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2773.421649] attempt to access beyond end of device [ 2773.441889] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 2773.448635] loop1: rw=1, want=4241, limit=112 09:25:35 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0xfdfdffff00000000}) [ 2773.464497] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2773.472463] attempt to access beyond end of device [ 2773.474373] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 2773.487914] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 2773.489943] loop1: rw=1, want=4569, limit=112 [ 2773.507621] 00000040: 00 00 00 00 00 00 0d 89 00 00 00 00 00 00 0d 8a ................ [ 2773.511436] attempt to access beyond end of device [ 2773.527447] 00000050: 00 00 00 01 00 00 10 00 00 00 00 0a 01 00 00 00 ................ [ 2773.533828] loop1: rw=1, want=4598, limit=112 [ 2773.547531] buffer_io_error: 41 callbacks suppressed [ 2773.547540] Buffer I/O error on dev loop1, logical block 4597, lost async page write [ 2773.552322] 00000060: 00 00 03 5a b4 24 02 00 04 00 00 04 00 00 00 00 ...Z.$.......... [ 2773.558633] attempt to access beyond end of device [ 2773.565611] 00000070: 00 00 00 00 00 ec 00 00 0c 09 0a 02 0c 00 00 00 ................ [ 2773.579007] loop1: rw=1, want=4599, limit=112 [ 2773.610799] Buffer I/O error on dev loop1, logical block 4598, lost async page write [ 2773.635424] attempt to access beyond end of device [ 2773.654336] loop1: rw=1, want=4600, limit=112 [ 2773.671109] XFS (loop0): SB validate failed with error -117. [ 2773.679311] Buffer I/O error on dev loop1, logical block 4599, lost async page write [ 2773.690715] attempt to access beyond end of device [ 2773.695853] loop1: rw=1, want=4601, limit=112 [ 2773.704322] Buffer I/O error on dev loop1, logical block 4600, lost async page write 09:25:35 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x1000000}) 09:25:35 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000017100000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2773.721911] attempt to access beyond end of device [ 2773.763221] loop1: rw=1, want=4622, limit=112 [ 2773.774723] Buffer I/O error on dev loop1, logical block 4621, lost async page write [ 2773.784197] attempt to access beyond end of device 09:25:35 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000000030000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2773.817944] loop1: rw=1, want=4623, limit=112 [ 2773.832392] Buffer I/O error on dev loop1, logical block 4622, lost async page write [ 2773.847367] attempt to access beyond end of device [ 2773.852383] loop1: rw=1, want=4624, limit=112 [ 2773.857374] Buffer I/O error on dev loop1, logical block 4623, lost async page write [ 2773.872235] attempt to access beyond end of device [ 2773.878965] loop1: rw=1, want=4625, limit=112 [ 2773.883570] Buffer I/O error on dev loop1, logical block 4624, lost async page write [ 2773.892076] attempt to access beyond end of device [ 2773.898497] loop1: rw=1, want=4674, limit=112 [ 2773.903283] Buffer I/O error on dev loop1, logical block 4673, lost async page write [ 2773.947110] attempt to access beyond end of device [ 2773.968424] loop1: rw=1, want=4675, limit=112 [ 2773.980535] Buffer I/O error on dev loop1, logical block 4674, lost async page write [ 2774.006695] attempt to access beyond end of device [ 2774.014342] loop1: rw=1, want=4676, limit=112 [ 2774.019833] attempt to access beyond end of device [ 2774.025605] loop1: rw=1, want=4677, limit=112 [ 2774.047230] attempt to access beyond end of device [ 2774.054993] loop1: rw=1, want=4686, limit=112 [ 2774.066476] attempt to access beyond end of device [ 2774.071678] loop1: rw=1, want=4687, limit=112 [ 2774.076547] attempt to access beyond end of device [ 2774.082715] loop1: rw=1, want=4688, limit=112 [ 2774.092946] XFS (loop2): Mounting V4 Filesystem [ 2774.101172] XFS (loop2): totally zeroed log [ 2774.106116] XFS (loop2): Failed to read root inode 0x7100000000000d88, error 22 [ 2774.112144] attempt to access beyond end of device [ 2774.124751] loop1: rw=1, want=4689, limit=112 [ 2774.130530] XFS (loop0): SB sanity check failed [ 2774.135510] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x440/0x570, xfs_sb block 0xffffffffffffffff [ 2774.159059] attempt to access beyond end of device [ 2774.164145] XFS (loop0): Unmount and run xfs_repair [ 2774.166428] loop1: rw=1, want=8785, limit=112 [ 2774.174826] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2774.181884] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 2774.196016] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2774.204382] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 2774.212687] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 2774.213480] attempt to access beyond end of device [ 2774.226501] 00000040: 00 00 00 00 00 00 0d 89 00 00 00 00 00 00 0d 8a ................ [ 2774.232770] loop1: rw=1, want=12881, limit=112 [ 2774.240007] 00000050: 00 00 00 01 00 00 10 00 00 00 00 00 03 00 00 00 ................ [ 2774.260660] 00000060: 00 00 03 5a b4 24 02 00 04 00 00 04 00 00 00 00 ...Z.$.......... [ 2774.275744] attempt to access beyond end of device [ 2774.281803] loop1: rw=1, want=16977, limit=112 [ 2774.284133] 00000070: 00 00 00 00 00 ec 00 00 0c 09 0a 02 0c 00 00 00 ................ [ 2774.297555] attempt to access beyond end of device [ 2774.302734] XFS (loop0): SB validate failed with error -117. [ 2774.311157] loop1: rw=1, want=21073, limit=112 [ 2774.333253] attempt to access beyond end of device [ 2774.338415] loop1: rw=1, want=25169, limit=112 [ 2774.350220] attempt to access beyond end of device [ 2774.355163] loop1: rw=1, want=29265, limit=112 [ 2774.367880] attempt to access beyond end of device [ 2774.373268] loop1: rw=1, want=32993, limit=112 09:25:36 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:25:36 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0xfdfdffff}) 09:25:36 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x400000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:25:36 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\v', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:25:36 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000009b00000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:25:36 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a0000000100001000000000010a0000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2775.267953] attempt to access beyond end of device [ 2775.293874] loop1: rw=1, want=130, limit=112 [ 2775.299051] attempt to access beyond end of device [ 2775.304169] loop1: rw=1, want=131, limit=112 [ 2775.309037] attempt to access beyond end of device [ 2775.309051] loop1: rw=1, want=132, limit=112 [ 2775.318896] attempt to access beyond end of device [ 2775.331676] loop1: rw=1, want=133, limit=112 [ 2775.338559] attempt to access beyond end of device [ 2775.343785] loop1: rw=1, want=142, limit=112 [ 2775.348414] attempt to access beyond end of device [ 2775.366044] loop1: rw=1, want=143, limit=112 [ 2775.375146] attempt to access beyond end of device [ 2775.386918] loop1: rw=1, want=144, limit=112 09:25:37 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0xfffffdfd}) [ 2775.391592] attempt to access beyond end of device [ 2775.396788] loop1: rw=1, want=145, limit=112 [ 2775.408924] attempt to access beyond end of device [ 2775.414074] loop1: rw=1, want=4241, limit=112 [ 2775.423690] attempt to access beyond end of device [ 2775.428870] loop1: rw=1, want=5081, limit=112 [ 2775.440066] attempt to access beyond end of device [ 2775.449328] loop1: rw=1, want=5110, limit=112 [ 2775.478949] attempt to access beyond end of device [ 2775.504770] loop1: rw=1, want=5111, limit=112 [ 2775.531134] attempt to access beyond end of device [ 2775.538448] loop1: rw=1, want=5112, limit=112 [ 2775.543261] attempt to access beyond end of device [ 2775.549401] loop1: rw=1, want=5113, limit=112 [ 2775.560508] attempt to access beyond end of device [ 2775.571783] loop1: rw=1, want=5134, limit=112 [ 2775.578334] XFS (loop0): Mounting V4 Filesystem [ 2775.582220] attempt to access beyond end of device [ 2775.589962] XFS (loop2): filesystem is marked as having an external log; specify logdev on the mount command line. 09:25:37 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x100000000000000}) 09:25:37 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\r', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2775.622388] XFS (loop0): totally zeroed log [ 2775.626833] loop1: rw=1, want=5135, limit=112 [ 2775.626872] attempt to access beyond end of device [ 2775.626883] loop1: rw=1, want=5136, limit=112 [ 2775.626913] attempt to access beyond end of device [ 2775.626923] loop1: rw=1, want=5137, limit=112 [ 2775.626986] attempt to access beyond end of device [ 2775.642054] XFS (loop2): SB validate failed with error -22. [ 2775.662601] loop1: rw=1, want=5186, limit=112 09:25:37 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x600000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2775.663099] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2775.667516] attempt to access beyond end of device [ 2775.682198] loop1: rw=1, want=5187, limit=112 [ 2775.687893] attempt to access beyond end of device [ 2775.695707] loop1: rw=1, want=5188, limit=112 [ 2775.702625] attempt to access beyond end of device [ 2775.707803] loop1: rw=1, want=5189, limit=112 [ 2775.712558] attempt to access beyond end of device [ 2775.717712] loop1: rw=1, want=5198, limit=112 [ 2775.722440] attempt to access beyond end of device [ 2775.727659] XFS (loop0): Unmount and run xfs_repair [ 2775.734017] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2775.742244] loop1: rw=1, want=5199, limit=112 [ 2775.747714] attempt to access beyond end of device [ 2775.752897] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2775.761361] loop1: rw=1, want=5200, limit=112 [ 2775.766035] attempt to access beyond end of device 09:25:37 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0xfdfdffff00000000}) [ 2775.772317] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2775.782317] loop1: rw=1, want=5201, limit=112 [ 2775.787069] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2775.803930] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2775.805649] attempt to access beyond end of device [ 2775.818012] loop1: rw=1, want=9297, limit=112 [ 2775.820894] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2775.832050] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2775.832677] attempt to access beyond end of device [ 2775.845779] loop1: rw=1, want=13393, limit=112 [ 2775.863466] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2775.880779] attempt to access beyond end of device [ 2775.885926] loop1: rw=1, want=17489, limit=112 [ 2775.890905] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2775.949843] attempt to access beyond end of device [ 2775.967026] loop1: rw=1, want=21585, limit=112 [ 2775.988284] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2776.014542] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2776.026183] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2776.053104] attempt to access beyond end of device [ 2776.060775] loop1: rw=1, want=25681, limit=112 09:25:37 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000009c00000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2776.103210] attempt to access beyond end of device [ 2776.111493] loop1: rw=1, want=29777, limit=112 [ 2776.151827] attempt to access beyond end of device [ 2776.161381] loop1: rw=1, want=32993, limit=112 [ 2776.425694] XFS (loop2): filesystem is marked as having an external log; specify logdev on the mount command line. [ 2776.445643] XFS (loop2): SB validate failed with error -22. 09:25:39 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:25:39 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x1000000}) 09:25:39 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x0e', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:25:39 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000008800000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:25:39 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000000c000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:25:39 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x6b8b6b, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2777.485052] attempt to access beyond end of device [ 2777.490095] loop1: rw=1, want=130, limit=112 [ 2777.494532] attempt to access beyond end of device [ 2777.499959] loop1: rw=1, want=131, limit=112 [ 2777.504413] attempt to access beyond end of device [ 2777.509796] loop1: rw=1, want=132, limit=112 [ 2777.514242] attempt to access beyond end of device [ 2777.520279] loop1: rw=1, want=133, limit=112 [ 2777.526630] attempt to access beyond end of device [ 2777.531575] loop1: rw=1, want=142, limit=112 [ 2777.536017] attempt to access beyond end of device [ 2777.545808] loop1: rw=1, want=143, limit=112 [ 2777.556600] attempt to access beyond end of device [ 2777.566727] loop1: rw=1, want=144, limit=112 [ 2777.575079] attempt to access beyond end of device [ 2777.589516] loop1: rw=1, want=145, limit=112 09:25:39 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0xfdfdffff}) [ 2777.636616] XFS (loop2): filesystem is marked as having an external log; specify logdev on the mount command line. [ 2777.652169] attempt to access beyond end of device [ 2777.657240] loop1: rw=1, want=4241, limit=112 [ 2777.676624] XFS (loop2): SB validate failed with error -22. [ 2777.692344] attempt to access beyond end of device [ 2777.701913] loop1: rw=1, want=5273, limit=112 [ 2777.717464] attempt to access beyond end of device [ 2777.722709] loop1: rw=1, want=5302, limit=112 [ 2777.776362] attempt to access beyond end of device [ 2777.782074] XFS (loop0): SB sanity check failed [ 2777.786621] loop1: rw=1, want=5303, limit=112 [ 2777.791283] attempt to access beyond end of device [ 2777.791296] loop1: rw=1, want=5304, limit=112 [ 2777.791340] attempt to access beyond end of device [ 2777.791354] loop1: rw=1, want=5305, limit=112 [ 2777.801045] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x440/0x570, xfs_sb block 0xffffffffffffffff [ 2777.818067] attempt to access beyond end of device [ 2777.826916] loop1: rw=1, want=5326, limit=112 [ 2777.843261] attempt to access beyond end of device [ 2777.846658] XFS (loop0): Unmount and run xfs_repair [ 2777.848311] loop1: rw=1, want=5327, limit=112 [ 2777.848346] attempt to access beyond end of device [ 2777.853797] XFS (loop0): First 128 bytes of corrupted metadata buffer: 09:25:39 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0xfffffdfd}) [ 2777.876081] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 2777.876396] loop1: rw=1, want=5328, limit=112 [ 2777.884938] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2777.892181] attempt to access beyond end of device 09:25:39 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000006000000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2777.921676] loop1: rw=1, want=5329, limit=112 [ 2777.923014] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 2777.926246] attempt to access beyond end of device [ 2777.940808] loop1: rw=1, want=5378, limit=112 [ 2777.947933] attempt to access beyond end of device [ 2777.953222] loop1: rw=1, want=5379, limit=112 09:25:39 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs#', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2777.974060] attempt to access beyond end of device [ 2777.980466] loop1: rw=1, want=5380, limit=112 [ 2777.992271] attempt to access beyond end of device [ 2777.994289] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 2778.005880] 00000040: 00 00 00 00 00 00 0d 89 00 00 00 00 00 00 0d 8a ................ [ 2778.018872] 00000050: 00 00 00 01 00 00 10 00 00 00 00 08 80 00 00 00 ................ [ 2778.019697] loop1: rw=1, want=5381, limit=112 [ 2778.043651] 00000060: 00 00 03 5a b4 24 02 00 04 00 00 04 00 00 00 00 ...Z.$.......... [ 2778.052343] 00000070: 00 00 00 00 00 ec 00 00 0c 09 0a 02 0c 00 00 00 ................ [ 2778.054144] attempt to access beyond end of device 09:25:39 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x100000000000000}) [ 2778.071525] XFS (loop0): SB validate failed with error -117. [ 2778.101715] loop1: rw=1, want=5390, limit=112 [ 2778.152154] attempt to access beyond end of device [ 2778.173223] loop1: rw=1, want=5391, limit=112 [ 2778.182735] attempt to access beyond end of device [ 2778.231984] loop1: rw=1, want=5392, limit=112 [ 2778.238180] attempt to access beyond end of device [ 2778.243196] loop1: rw=1, want=5393, limit=112 09:25:40 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0xfdfdffff00000000}) [ 2778.301193] XFS (loop2): Mounting V4 Filesystem [ 2778.316231] attempt to access beyond end of device [ 2778.316503] XFS (loop2): totally zeroed log [ 2778.336359] loop1: rw=1, want=9489, limit=112 [ 2778.345508] XFS (loop2): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2778.395031] XFS (loop2): Unmount and run xfs_repair [ 2778.411530] attempt to access beyond end of device [ 2778.421250] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2778.429987] loop1: rw=1, want=13585, limit=112 [ 2778.441381] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2778.461085] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2778.493225] attempt to access beyond end of device [ 2778.523829] loop1: rw=1, want=17681, limit=112 [ 2778.532370] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2778.560210] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2778.578437] attempt to access beyond end of device [ 2778.586048] loop1: rw=1, want=21777, limit=112 [ 2778.596385] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2778.604541] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2778.618342] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2778.635437] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2778.648070] attempt to access beyond end of device [ 2778.659983] loop1: rw=1, want=25873, limit=112 [ 2778.664726] XFS (loop2): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2778.686481] XFS (loop2): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2778.713022] attempt to access beyond end of device [ 2778.720640] XFS (loop2): Failed to read root inode 0xd88, error 117 [ 2778.722845] loop1: rw=1, want=29969, limit=112 [ 2778.752850] attempt to access beyond end of device [ 2778.760194] loop1: rw=1, want=32993, limit=112 09:25:41 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs$', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:25:41 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a0000000100001000000000dd321200000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:25:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000000}) 09:25:41 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x80ffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:25:41 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:25:41 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000010000000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2779.692142] attempt to access beyond end of device [ 2779.698222] loop1: rw=1, want=130, limit=112 [ 2779.703088] buffer_io_error: 54 callbacks suppressed [ 2779.703148] Buffer I/O error on dev loop1, logical block 129, lost async page write [ 2779.716335] attempt to access beyond end of device [ 2779.721303] loop1: rw=1, want=131, limit=112 [ 2779.725721] Buffer I/O error on dev loop1, logical block 130, lost async page write [ 2779.734074] attempt to access beyond end of device [ 2779.739224] loop1: rw=1, want=132, limit=112 [ 2779.743793] Buffer I/O error on dev loop1, logical block 131, lost async page write [ 2779.751734] attempt to access beyond end of device [ 2779.757743] loop1: rw=1, want=133, limit=112 [ 2779.762237] Buffer I/O error on dev loop1, logical block 132, lost async page write [ 2779.770245] attempt to access beyond end of device [ 2779.776394] loop1: rw=1, want=142, limit=112 [ 2779.781271] Buffer I/O error on dev loop1, logical block 141, lost async page write [ 2779.793763] attempt to access beyond end of device [ 2779.798960] loop1: rw=1, want=143, limit=112 [ 2779.803502] Buffer I/O error on dev loop1, logical block 142, lost async page write [ 2779.818317] attempt to access beyond end of device [ 2779.829200] loop1: rw=1, want=144, limit=112 09:25:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfdfdffff}) [ 2779.856156] Buffer I/O error on dev loop1, logical block 143, lost async page write [ 2779.872634] attempt to access beyond end of device [ 2779.877784] loop1: rw=1, want=145, limit=112 [ 2779.883431] Buffer I/O error on dev loop1, logical block 144, lost async page write [ 2779.897497] attempt to access beyond end of device [ 2779.902515] loop1: rw=1, want=4241, limit=112 [ 2779.912904] attempt to access beyond end of device [ 2779.943270] loop1: rw=1, want=5273, limit=112 [ 2779.978229] attempt to access beyond end of device [ 2779.996454] loop1: rw=1, want=5302, limit=112 [ 2780.001176] Buffer I/O error on dev loop1, logical block 5301, lost async page write [ 2780.017539] attempt to access beyond end of device [ 2780.022753] loop1: rw=1, want=5303, limit=112 09:25:41 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0xc0ffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2780.031822] Buffer I/O error on dev loop1, logical block 5302, lost async page write [ 2780.040266] attempt to access beyond end of device [ 2780.045377] loop1: rw=1, want=5304, limit=112 [ 2780.050171] attempt to access beyond end of device [ 2780.055106] loop1: rw=1, want=5305, limit=112 [ 2780.055145] attempt to access beyond end of device [ 2780.055156] loop1: rw=1, want=5326, limit=112 [ 2780.055185] attempt to access beyond end of device 09:25:41 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs<', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2780.077783] XFS (loop2): Mounting V4 Filesystem [ 2780.088537] loop1: rw=1, want=5327, limit=112 [ 2780.092358] XFS (loop0): SB sanity check failed [ 2780.096128] attempt to access beyond end of device [ 2780.101345] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x440/0x570, xfs_sb block 0xffffffffffffffff [ 2780.103091] loop1: rw=1, want=5328, limit=112 [ 2780.122522] attempt to access beyond end of device [ 2780.127888] loop1: rw=1, want=5329, limit=112 09:25:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffdfd}) [ 2780.132616] attempt to access beyond end of device [ 2780.139019] attempt to access beyond end of device [ 2780.144090] loop2: rw=4096, want=32769, limit=32768 [ 2780.149235] loop1: rw=1, want=5378, limit=112 [ 2780.153770] attempt to access beyond end of device [ 2780.158887] XFS (loop2): metadata I/O error in "xlog_bread_noalign" at daddr 0x8000 len 1 error 5 [ 2780.168692] loop1: rw=1, want=5379, limit=112 [ 2780.173827] attempt to access beyond end of device [ 2780.179061] XFS (loop2): empty log check failed [ 2780.183964] loop1: rw=1, want=5380, limit=112 [ 2780.185780] XFS (loop0): Unmount and run xfs_repair [ 2780.188615] XFS (loop2): log mount/recovery failed: error -5 [ 2780.189136] XFS (loop2): log mount failed [ 2780.200874] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2780.204963] attempt to access beyond end of device [ 2780.217076] loop1: rw=1, want=5381, limit=112 [ 2780.240303] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 2780.263717] attempt to access beyond end of device [ 2780.288135] loop1: rw=1, want=5390, limit=112 [ 2780.325986] attempt to access beyond end of device [ 2780.339249] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2780.349033] loop1: rw=1, want=5391, limit=112 [ 2780.353571] attempt to access beyond end of device 09:25:42 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000047000000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:25:42 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x100000000000000}) [ 2780.381630] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 2780.414467] loop1: rw=1, want=5392, limit=112 [ 2780.420378] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 2780.443646] attempt to access beyond end of device [ 2780.444362] 00000040: 00 00 00 00 00 00 0d 89 00 00 00 00 00 00 0d 8a ................ [ 2780.460461] loop1: rw=1, want=5393, limit=112 [ 2780.466398] 00000050: 00 00 00 01 00 00 10 00 00 00 00 dd 32 12 00 00 ............2... [ 2780.484964] attempt to access beyond end of device [ 2780.496706] 00000060: 00 00 03 5a b4 24 02 00 04 00 00 04 00 00 00 00 ...Z.$.......... [ 2780.504914] loop1: rw=1, want=9489, limit=112 [ 2780.516763] 00000070: 00 00 00 00 00 ec 00 00 0c 09 0a 02 0c 00 00 00 ................ [ 2780.527315] attempt to access beyond end of device [ 2780.534972] XFS (loop0): SB validate failed with error -117. [ 2780.540927] loop1: rw=1, want=13585, limit=112 [ 2780.554050] attempt to access beyond end of device [ 2780.571510] loop1: rw=1, want=17681, limit=112 [ 2780.595447] attempt to access beyond end of device 09:25:42 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfsD', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2780.620341] loop1: rw=1, want=21777, limit=112 09:25:42 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a00000001000010000000000000007d000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:25:42 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfdfdffff00000000}) [ 2780.699287] attempt to access beyond end of device [ 2780.706624] loop1: rw=1, want=25873, limit=112 [ 2780.716091] attempt to access beyond end of device [ 2780.770594] loop1: rw=1, want=29969, limit=112 [ 2780.838222] attempt to access beyond end of device [ 2780.853018] loop1: rw=1, want=32993, limit=112 [ 2780.864402] XFS (loop2): Mounting V4 Filesystem 09:25:42 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1000000}) [ 2780.896527] attempt to access beyond end of device [ 2780.901871] loop2: rw=4096, want=145409, limit=32768 [ 2780.926455] XFS (loop2): metadata I/O error in "xlog_bread_noalign" at daddr 0x23800 len 1 error 5 [ 2780.977492] XFS (loop0): SB sanity check failed [ 2780.985738] XFS (loop2): empty log check failed [ 2780.992375] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x440/0x570, xfs_sb block 0xffffffffffffffff [ 2781.025897] XFS (loop2): log mount/recovery failed: error -5 [ 2781.053855] XFS (loop0): Unmount and run xfs_repair [ 2781.055622] XFS (loop2): log mount failed [ 2781.076904] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2781.131968] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 2781.192494] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2781.217842] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 2781.259474] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 2781.318814] 00000040: 00 00 00 00 00 00 0d 89 00 00 00 00 00 00 0d 8a ................ [ 2781.343914] 00000050: 00 00 00 01 00 00 10 00 00 00 00 00 00 00 7d 00 ..............}. [ 2781.358041] 00000060: 00 00 03 5a b4 24 02 00 04 00 00 04 00 00 00 00 ...Z.$.......... [ 2781.375544] 00000070: 00 00 00 00 00 ec 00 00 0c 09 0a 02 0c 00 00 00 ................ [ 2781.385145] XFS (loop0): SB validate failed with error -117. 09:25:44 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xfdfdffff}) 09:25:44 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfsH', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:25:44 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000048000000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:25:44 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0xf0ffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:25:44 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:25:44 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a00000001000010000000001fffffff000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2782.349610] attempt to access beyond end of device [ 2782.357774] loop1: rw=1, want=130, limit=112 [ 2782.362224] attempt to access beyond end of device [ 2782.387916] loop1: rw=1, want=131, limit=112 [ 2782.392470] attempt to access beyond end of device [ 2782.404667] loop1: rw=1, want=132, limit=112 [ 2782.418117] attempt to access beyond end of device [ 2782.458714] loop1: rw=1, want=133, limit=112 [ 2782.491779] XFS (loop2): Mounting V4 Filesystem [ 2782.493175] attempt to access beyond end of device [ 2782.502365] attempt to access beyond end of device [ 2782.510382] loop2: rw=4096, want=147457, limit=32768 [ 2782.515770] XFS (loop2): metadata I/O error in "xlog_bread_noalign" at daddr 0x24000 len 1 error 5 [ 2782.523489] loop1: rw=1, want=142, limit=112 [ 2782.525072] XFS (loop2): empty log check failed 09:25:44 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xfffffdfd}) [ 2782.545148] attempt to access beyond end of device [ 2782.549671] XFS (loop2): log mount/recovery failed: error -5 [ 2782.553825] loop1: rw=1, want=143, limit=112 [ 2782.577177] XFS (loop0): SB sanity check failed [ 2782.581892] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x440/0x570, xfs_sb block 0xffffffffffffffff 09:25:44 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfsL', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2782.603551] attempt to access beyond end of device [ 2782.608205] XFS (loop2): log mount failed [ 2782.643186] XFS (loop0): Unmount and run xfs_repair [ 2782.643628] loop1: rw=1, want=144, limit=112 09:25:44 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x100000000000000}) [ 2782.659410] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2782.665529] attempt to access beyond end of device [ 2782.712708] loop1: rw=1, want=145, limit=112 [ 2782.744486] attempt to access beyond end of device [ 2782.749812] loop1: rw=1, want=3417, limit=112 [ 2782.758186] attempt to access beyond end of device [ 2782.761550] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 2782.763371] loop1: rw=1, want=3446, limit=112 [ 2782.791624] attempt to access beyond end of device [ 2782.802120] loop1: rw=1, want=3447, limit=112 [ 2782.807118] attempt to access beyond end of device [ 2782.812390] loop1: rw=1, want=3448, limit=112 [ 2782.817903] attempt to access beyond end of device [ 2782.839059] loop1: rw=1, want=3449, limit=112 09:25:44 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000}) [ 2782.852486] attempt to access beyond end of device [ 2782.857886] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2782.863364] loop1: rw=1, want=3470, limit=112 [ 2782.866046] 00000020: 34 fb 8f b9 e4 bf 48 b6 ad 26 c5 97 eb 4f 5c 19 4.....H..&...O\. [ 2782.866059] 00000030: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0d 88 ................ [ 2782.866071] 00000040: 00 00 00 00 00 00 0d 89 00 00 00 00 00 00 0d 8a ................ 09:25:44 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000009b000000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2782.866083] 00000050: 00 00 00 01 00 00 10 00 00 00 00 1f ff ff ff 00 ................ [ 2782.866094] 00000060: 00 00 03 5a b4 24 02 00 04 00 00 04 00 00 00 00 ...Z.$.......... [ 2782.866106] 00000070: 00 00 00 00 00 ec 00 00 0c 09 0a 02 0c 00 00 00 ................ [ 2782.866145] XFS (loop0): SB validate failed with error -117. [ 2782.878983] attempt to access beyond end of device [ 2782.955257] loop1: rw=1, want=3471, limit=112 [ 2782.964149] attempt to access beyond end of device [ 2782.973168] loop1: rw=1, want=3472, limit=112 [ 2782.986120] attempt to access beyond end of device [ 2782.994245] loop1: rw=1, want=3473, limit=112 [ 2782.999482] attempt to access beyond end of device [ 2783.011906] loop1: rw=1, want=3522, limit=112 [ 2783.021570] attempt to access beyond end of device [ 2783.026811] loop1: rw=1, want=3523, limit=112 [ 2783.054752] attempt to access beyond end of device [ 2783.097552] loop1: rw=1, want=3524, limit=112 09:25:44 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) [ 2783.121985] attempt to access beyond end of device 09:25:44 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfsN', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2783.178534] loop1: rw=1, want=3525, limit=112 09:25:44 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001020000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2783.204782] attempt to access beyond end of device [ 2783.242132] XFS (loop2): Mounting V4 Filesystem [ 2783.247570] loop1: rw=1, want=3534, limit=112 [ 2783.266509] attempt to access beyond end of device [ 2783.277274] attempt to access beyond end of device [ 2783.286765] loop2: rw=4096, want=317441, limit=32768 09:25:45 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x1000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2783.298677] loop1: rw=1, want=3535, limit=112 [ 2783.305892] XFS (loop2): metadata I/O error in "xlog_bread_noalign" at daddr 0x4d800 len 1 error 5 [ 2783.308051] attempt to access beyond end of device 09:25:45 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff}) [ 2783.348798] XFS (loop2): empty log check failed [ 2783.360991] XFS (loop2): log mount/recovery failed: error -5 [ 2783.365128] loop1: rw=1, want=3536, limit=112 [ 2783.380510] attempt to access beyond end of device [ 2783.392889] XFS (loop2): log mount failed [ 2783.396213] loop1: rw=1, want=3537, limit=112 [ 2783.446241] attempt to access beyond end of device [ 2783.462508] loop1: rw=1, want=7633, limit=112 [ 2783.508730] attempt to access beyond end of device [ 2783.513828] loop1: rw=1, want=11729, limit=112 [ 2783.565798] attempt to access beyond end of device [ 2783.589256] loop1: rw=1, want=15825, limit=112 [ 2783.622647] attempt to access beyond end of device [ 2783.633935] loop1: rw=1, want=19921, limit=112 [ 2783.640134] XFS (loop0): Mounting V4 Filesystem [ 2783.697040] XFS (loop0): totally zeroed log [ 2783.713957] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2783.720812] attempt to access beyond end of device [ 2783.738803] loop1: rw=1, want=24017, limit=112 [ 2783.768962] XFS (loop0): Unmount and run xfs_repair [ 2783.781300] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2783.796778] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2783.801717] attempt to access beyond end of device [ 2783.812937] loop1: rw=1, want=28113, limit=112 [ 2783.821705] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2783.827857] attempt to access beyond end of device [ 2783.835108] loop1: rw=1, want=32209, limit=112 [ 2783.842060] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2783.844160] attempt to access beyond end of device [ 2783.856039] loop1: rw=1, want=32993, limit=112 [ 2783.856191] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2783.870972] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2783.886057] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2783.906352] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2783.920229] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2783.941364] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2783.956401] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2783.971779] XFS (loop0): Failed to read root inode 0xd88, error 117 09:25:46 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:25:46 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfsO', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:25:46 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd}) 09:25:46 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000009c000000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:25:46 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001030000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:25:46 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x2000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2785.048602] attempt to access beyond end of device [ 2785.053589] loop1: rw=1, want=130, limit=112 [ 2785.069168] buffer_io_error: 38 callbacks suppressed [ 2785.069178] Buffer I/O error on dev loop1, logical block 129, lost async page write [ 2785.082924] attempt to access beyond end of device [ 2785.088274] loop1: rw=1, want=131, limit=112 [ 2785.092814] Buffer I/O error on dev loop1, logical block 130, lost async page write [ 2785.100846] attempt to access beyond end of device [ 2785.105896] loop1: rw=1, want=132, limit=112 [ 2785.110672] Buffer I/O error on dev loop1, logical block 131, lost async page write [ 2785.118714] attempt to access beyond end of device [ 2785.124165] loop1: rw=1, want=133, limit=112 [ 2785.128858] Buffer I/O error on dev loop1, logical block 132, lost async page write [ 2785.137255] attempt to access beyond end of device [ 2785.144942] loop1: rw=1, want=142, limit=112 [ 2785.159738] Buffer I/O error on dev loop1, logical block 141, lost async page write [ 2785.194651] attempt to access beyond end of device 09:25:46 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) [ 2785.242113] loop1: rw=1, want=143, limit=112 [ 2785.256135] Buffer I/O error on dev loop1, logical block 142, lost async page write [ 2785.294217] attempt to access beyond end of device [ 2785.340635] loop1: rw=1, want=144, limit=112 09:25:47 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfsP', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:25:47 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x3000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2785.365831] Buffer I/O error on dev loop1, logical block 143, lost async page write [ 2785.382504] XFS (loop0): Mounting V4 Filesystem [ 2785.393472] XFS (loop2): Mounting V4 Filesystem [ 2785.406146] XFS (loop0): totally zeroed log [ 2785.408492] attempt to access beyond end of device [ 2785.416025] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2785.417106] attempt to access beyond end of device [ 2785.426373] XFS (loop0): Unmount and run xfs_repair [ 2785.435642] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2785.446823] loop1: rw=1, want=145, limit=112 [ 2785.456798] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:25:47 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000}) [ 2785.482226] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2785.484824] Buffer I/O error on dev loop1, logical block 144, lost async page write [ 2785.490624] loop2: rw=4096, want=319489, limit=32768 [ 2785.514652] XFS (loop2): metadata I/O error in "xlog_bread_noalign" at daddr 0x4e000 len 1 error 5 [ 2785.548408] attempt to access beyond end of device [ 2785.557786] XFS (loop2): empty log check failed [ 2785.562717] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2785.563450] XFS (loop2): log mount/recovery failed: error -5 [ 2785.593473] loop1: rw=1, want=3609, limit=112 [ 2785.624651] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2785.643300] attempt to access beyond end of device [ 2785.649175] XFS (loop2): log mount failed [ 2785.652359] loop1: rw=1, want=3638, limit=112 [ 2785.658550] Buffer I/O error on dev loop1, logical block 3637, lost async page write 09:25:47 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs^', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2785.667291] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2785.675829] attempt to access beyond end of device [ 2785.681627] loop1: rw=1, want=3639, limit=112 [ 2785.687396] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2785.704876] Buffer I/O error on dev loop1, logical block 3638, lost async page write 09:25:47 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) [ 2785.725929] attempt to access beyond end of device [ 2785.731483] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2785.749372] loop1: rw=1, want=3640, limit=112 [ 2785.755951] attempt to access beyond end of device [ 2785.791957] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2785.807396] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2785.813922] loop1: rw=1, want=3641, limit=112 [ 2785.832458] attempt to access beyond end of device [ 2785.845944] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2785.849363] loop1: rw=1, want=3662, limit=112 [ 2785.886635] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2785.895591] attempt to access beyond end of device [ 2785.906358] loop1: rw=1, want=3663, limit=112 [ 2785.937129] attempt to access beyond end of device [ 2785.966678] loop1: rw=1, want=3664, limit=112 [ 2785.980496] attempt to access beyond end of device [ 2785.985565] loop1: rw=1, want=3665, limit=112 [ 2786.028235] attempt to access beyond end of device [ 2786.061476] loop1: rw=1, want=3714, limit=112 [ 2786.066021] attempt to access beyond end of device [ 2786.078220] loop1: rw=1, want=3715, limit=112 [ 2786.083047] attempt to access beyond end of device [ 2786.093038] loop1: rw=1, want=3716, limit=112 [ 2786.147624] attempt to access beyond end of device [ 2786.152569] loop1: rw=1, want=3717, limit=112 [ 2786.187347] attempt to access beyond end of device [ 2786.192306] loop1: rw=1, want=3726, limit=112 [ 2786.197594] attempt to access beyond end of device [ 2786.202543] loop1: rw=1, want=3727, limit=112 [ 2786.220698] attempt to access beyond end of device [ 2786.225642] loop1: rw=1, want=3728, limit=112 [ 2786.231561] attempt to access beyond end of device [ 2786.236957] loop1: rw=1, want=3729, limit=112 [ 2786.247708] attempt to access beyond end of device [ 2786.252646] loop1: rw=1, want=7825, limit=112 [ 2786.265908] attempt to access beyond end of device [ 2786.271187] loop1: rw=1, want=11921, limit=112 [ 2786.285004] attempt to access beyond end of device [ 2786.290090] loop1: rw=1, want=16017, limit=112 [ 2786.303644] attempt to access beyond end of device [ 2786.308700] loop1: rw=1, want=20113, limit=112 [ 2786.321943] attempt to access beyond end of device [ 2786.326987] loop1: rw=1, want=24209, limit=112 [ 2786.340365] attempt to access beyond end of device [ 2786.345552] loop1: rw=1, want=28305, limit=112 [ 2786.369198] attempt to access beyond end of device [ 2786.374138] loop1: rw=1, want=32401, limit=112 [ 2786.389942] attempt to access beyond end of device [ 2786.394886] loop1: rw=1, want=32993, limit=112 09:25:49 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x0, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:25:49 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff}) 09:25:49 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs`', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:25:49 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c19000000000000c0000000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:25:49 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001040000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:25:49 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x4000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2787.346461] attempt to access beyond end of device [ 2787.362443] loop1: rw=1, want=130, limit=112 [ 2787.367446] attempt to access beyond end of device [ 2787.372685] loop1: rw=1, want=131, limit=112 [ 2787.377935] attempt to access beyond end of device [ 2787.382963] loop1: rw=1, want=132, limit=112 [ 2787.387795] attempt to access beyond end of device [ 2787.392986] loop1: rw=1, want=133, limit=112 [ 2787.398072] attempt to access beyond end of device [ 2787.403687] loop1: rw=1, want=142, limit=112 [ 2787.416654] attempt to access beyond end of device [ 2787.421667] loop1: rw=1, want=143, limit=112 [ 2787.434575] attempt to access beyond end of device [ 2787.443572] loop1: rw=1, want=144, limit=112 [ 2787.452650] attempt to access beyond end of device [ 2787.465547] loop1: rw=1, want=145, limit=112 09:25:49 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd}) [ 2787.531961] attempt to access beyond end of device [ 2787.551548] loop1: rw=1, want=4241, limit=112 [ 2787.558078] XFS (loop2): Mounting V4 Filesystem [ 2787.588083] attempt to access beyond end of device [ 2787.605538] attempt to access beyond end of device [ 2787.614218] loop2: rw=4096, want=393217, limit=32768 [ 2787.630275] XFS (loop0): Mounting V4 Filesystem 09:25:49 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfsd', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2787.635501] loop1: rw=1, want=5081, limit=112 [ 2787.655529] XFS (loop0): totally zeroed log [ 2787.658553] XFS (loop2): metadata I/O error in "xlog_bread_noalign" at daddr 0x60000 len 1 error 5 [ 2787.678120] attempt to access beyond end of device [ 2787.700104] loop1: rw=1, want=5110, limit=112 [ 2787.716469] XFS (loop2): empty log check failed [ 2787.716839] attempt to access beyond end of device [ 2787.721360] XFS (loop2): log mount/recovery failed: error -5 [ 2787.726217] loop1: rw=1, want=5111, limit=112 [ 2787.756943] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2787.758784] attempt to access beyond end of device [ 2787.777182] XFS (loop2): log mount failed [ 2787.783648] loop1: rw=1, want=5112, limit=112 [ 2787.786202] XFS (loop0): Unmount and run xfs_repair [ 2787.793584] attempt to access beyond end of device [ 2787.801415] loop1: rw=1, want=5113, limit=112 09:25:49 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) [ 2787.806051] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2787.812814] attempt to access beyond end of device [ 2787.812827] loop1: rw=1, want=5134, limit=112 [ 2787.812859] attempt to access beyond end of device [ 2787.812872] loop1: rw=1, want=5135, limit=112 [ 2787.837350] attempt to access beyond end of device [ 2787.856834] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2787.859168] loop1: rw=1, want=5136, limit=112 [ 2787.884258] attempt to access beyond end of device [ 2787.890674] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2787.902417] loop1: rw=1, want=5137, limit=112 [ 2787.914216] attempt to access beyond end of device [ 2787.923233] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2787.925100] loop1: rw=1, want=5186, limit=112 [ 2787.943278] attempt to access beyond end of device [ 2787.944188] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2787.955328] loop1: rw=1, want=5187, limit=112 [ 2787.963320] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2787.966059] attempt to access beyond end of device [ 2787.988669] loop1: rw=1, want=5188, limit=112 [ 2787.994712] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:25:49 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000}) [ 2788.014161] attempt to access beyond end of device [ 2788.029526] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2788.042261] loop1: rw=1, want=5189, limit=112 [ 2788.052255] attempt to access beyond end of device [ 2788.060583] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2788.072500] loop1: rw=1, want=5198, limit=112 [ 2788.080748] attempt to access beyond end of device [ 2788.085941] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2788.086190] loop1: rw=1, want=5199, limit=112 [ 2788.106166] attempt to access beyond end of device [ 2788.112506] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2788.124733] loop1: rw=1, want=5200, limit=112 [ 2788.133144] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2788.133211] attempt to access beyond end of device [ 2788.150681] loop1: rw=1, want=5201, limit=112 [ 2788.202817] attempt to access beyond end of device 09:25:49 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfsh', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2788.230329] loop1: rw=1, want=9297, limit=112 09:25:50 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) [ 2788.336431] attempt to access beyond end of device [ 2788.354155] loop1: rw=1, want=13393, limit=112 [ 2788.448794] attempt to access beyond end of device [ 2788.453747] loop1: rw=1, want=17489, limit=112 [ 2788.463493] attempt to access beyond end of device [ 2788.468482] loop1: rw=1, want=21585, limit=112 [ 2788.491474] attempt to access beyond end of device [ 2788.497521] loop1: rw=1, want=25681, limit=112 [ 2788.508299] attempt to access beyond end of device [ 2788.513334] loop1: rw=1, want=29777, limit=112 [ 2788.568259] attempt to access beyond end of device [ 2788.573219] loop1: rw=1, want=32993, limit=112 09:25:51 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000009010000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:25:51 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001050000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:25:51 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x5000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:25:51 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff}) 09:25:51 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x0, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:25:51 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfsl', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2789.497877] attempt to access beyond end of device [ 2789.502862] loop1: rw=1, want=130, limit=112 [ 2789.549924] attempt to access beyond end of device [ 2789.579497] loop1: rw=1, want=131, limit=112 09:25:51 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd}) [ 2789.612102] attempt to access beyond end of device [ 2789.627870] XFS (loop0): Mounting V4 Filesystem [ 2789.656722] loop1: rw=1, want=132, limit=112 [ 2789.664970] attempt to access beyond end of device [ 2789.670805] XFS (loop0): totally zeroed log [ 2789.682695] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2789.702771] loop1: rw=1, want=133, limit=112 [ 2789.719656] attempt to access beyond end of device [ 2789.733109] XFS (loop0): Unmount and run xfs_repair [ 2789.735822] XFS (loop2): Mounting V4 Filesystem [ 2789.756549] loop1: rw=1, want=142, limit=112 [ 2789.759610] XFS (loop2): totally zeroed log 09:25:51 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfst', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2789.762292] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2789.781584] attempt to access beyond end of device [ 2789.794737] loop1: rw=1, want=143, limit=112 [ 2789.799964] XFS (loop2): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2789.801904] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:25:51 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) [ 2789.822614] attempt to access beyond end of device [ 2789.829857] loop1: rw=1, want=144, limit=112 [ 2789.834495] attempt to access beyond end of device [ 2789.844374] XFS (loop2): Unmount and run xfs_repair [ 2789.855289] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2789.870512] loop1: rw=1, want=145, limit=112 [ 2789.885910] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2789.888873] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2789.912933] attempt to access beyond end of device [ 2789.929111] loop1: rw=1, want=3161, limit=112 [ 2789.936167] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2789.936186] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2789.959159] attempt to access beyond end of device [ 2789.978492] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2789.986963] loop1: rw=1, want=3190, limit=112 [ 2789.997426] attempt to access beyond end of device [ 2790.002657] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2790.015069] loop1: rw=1, want=3191, limit=112 09:25:51 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000}) [ 2790.029822] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2790.042150] attempt to access beyond end of device [ 2790.048381] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2790.066615] loop1: rw=1, want=3192, limit=112 [ 2790.077999] buffer_io_error: 48 callbacks suppressed [ 2790.078017] Buffer I/O error on dev loop1, logical block 3191, lost async page write [ 2790.092445] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2790.100921] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2790.101095] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2790.119891] attempt to access beyond end of device [ 2790.126169] loop1: rw=1, want=3193, limit=112 [ 2790.150091] Buffer I/O error on dev loop1, logical block 3192, lost async page write [ 2790.156746] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2790.168843] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 09:25:51 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfsx', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2790.169264] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2790.189964] attempt to access beyond end of device [ 2790.200784] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2790.208574] loop1: rw=1, want=3214, limit=112 [ 2790.214122] Buffer I/O error on dev loop1, logical block 3213, lost async page write 09:25:51 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) [ 2790.229474] attempt to access beyond end of device [ 2790.234628] loop1: rw=1, want=3215, limit=112 [ 2790.256697] Buffer I/O error on dev loop1, logical block 3214, lost async page write [ 2790.262760] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2790.265146] attempt to access beyond end of device [ 2790.280479] loop1: rw=1, want=3216, limit=112 [ 2790.307155] Buffer I/O error on dev loop1, logical block 3215, lost async page write [ 2790.315356] attempt to access beyond end of device [ 2790.320654] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2790.326508] loop1: rw=1, want=3217, limit=112 [ 2790.334657] Buffer I/O error on dev loop1, logical block 3216, lost async page write [ 2790.349271] attempt to access beyond end of device [ 2790.354978] loop1: rw=1, want=3266, limit=112 [ 2790.378828] Buffer I/O error on dev loop1, logical block 3265, lost async page write [ 2790.414619] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2790.446519] attempt to access beyond end of device [ 2790.471631] loop1: rw=1, want=3267, limit=112 [ 2790.484248] Buffer I/O error on dev loop1, logical block 3266, lost async page write [ 2790.486681] XFS (loop2): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2790.514199] attempt to access beyond end of device [ 2790.562235] loop1: rw=1, want=3268, limit=112 [ 2790.567333] Buffer I/O error on dev loop1, logical block 3267, lost async page write [ 2790.575548] attempt to access beyond end of device [ 2790.576005] XFS (loop2): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2790.588711] loop1: rw=1, want=3269, limit=112 [ 2790.593916] Buffer I/O error on dev loop1, logical block 3268, lost async page write [ 2790.632873] XFS (loop2): Failed to read root inode 0xd88, error 117 [ 2790.643310] attempt to access beyond end of device [ 2790.651117] loop1: rw=1, want=3278, limit=112 [ 2790.655734] attempt to access beyond end of device [ 2790.661169] loop1: rw=1, want=3279, limit=112 [ 2790.665767] attempt to access beyond end of device [ 2790.671739] loop1: rw=1, want=3280, limit=112 [ 2790.676871] attempt to access beyond end of device [ 2790.692824] loop1: rw=1, want=3281, limit=112 [ 2790.706969] attempt to access beyond end of device [ 2790.711932] loop1: rw=1, want=7377, limit=112 09:25:52 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000a010000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:25:52 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001060000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:25:52 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfsz', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:25:52 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff}) [ 2790.742742] attempt to access beyond end of device [ 2790.748083] loop1: rw=1, want=11473, limit=112 [ 2790.834782] attempt to access beyond end of device [ 2790.854732] loop1: rw=1, want=15569, limit=112 [ 2790.890245] attempt to access beyond end of device [ 2790.895457] loop1: rw=1, want=19665, limit=112 [ 2790.907048] XFS (loop2): Mounting V4 Filesystem [ 2790.923462] XFS (loop2): totally zeroed log [ 2790.929412] XFS (loop0): Mounting V4 Filesystem [ 2790.934614] XFS (loop2): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2790.951774] XFS (loop2): Unmount and run xfs_repair [ 2790.957416] XFS (loop0): totally zeroed log [ 2790.958277] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2790.970132] attempt to access beyond end of device [ 2790.973391] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2790.975412] loop1: rw=1, want=23761, limit=112 [ 2790.990028] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2790.997336] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2791.017620] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2791.021142] attempt to access beyond end of device [ 2791.031276] XFS (loop0): Unmount and run xfs_repair [ 2791.032648] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2791.056824] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2791.064071] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2791.075635] loop1: rw=1, want=27857, limit=112 [ 2791.080602] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2791.086395] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2791.093805] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2791.100841] attempt to access beyond end of device [ 2791.110641] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2791.112710] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2791.124411] loop1: rw=1, want=31953, limit=112 [ 2791.127168] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2791.142082] attempt to access beyond end of device [ 2791.151205] loop1: rw=1, want=32993, limit=112 [ 2791.152167] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2791.165927] XFS (loop2): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2791.178445] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2791.187062] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2791.195300] XFS (loop2): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2791.204157] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2791.212677] XFS (loop2): Failed to read root inode 0xd88, error 117 [ 2791.232967] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2791.241733] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2791.254639] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2791.264195] XFS (loop0): Failed to read root inode 0xd88, error 117 09:25:53 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd}) 09:25:53 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x6000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:25:53 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x0, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:25:53 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs~', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:25:53 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000040010000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:25:53 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001080000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2792.170136] attempt to access beyond end of device [ 2792.175108] loop1: rw=1, want=130, limit=112 [ 2792.199171] attempt to access beyond end of device [ 2792.225178] loop1: rw=1, want=131, limit=112 [ 2792.244056] attempt to access beyond end of device [ 2792.249882] loop1: rw=1, want=132, limit=112 [ 2792.254809] attempt to access beyond end of device [ 2792.254822] loop1: rw=1, want=133, limit=112 [ 2792.271542] attempt to access beyond end of device [ 2792.292937] XFS (loop0): Mounting V4 Filesystem [ 2792.302332] loop1: rw=1, want=142, limit=112 09:25:54 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) [ 2792.337235] XFS (loop2): Mounting V4 Filesystem [ 2792.338073] attempt to access beyond end of device [ 2792.345760] XFS (loop0): totally zeroed log [ 2792.359129] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2792.370964] loop1: rw=1, want=143, limit=112 [ 2792.378506] XFS (loop0): Unmount and run xfs_repair [ 2792.382796] attempt to access beyond end of device [ 2792.383736] attempt to access beyond end of device [ 2792.406978] loop2: rw=4096, want=131081, limit=32768 [ 2792.416691] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2792.426627] loop1: rw=1, want=144, limit=112 09:25:54 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x86', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2792.428181] XFS (loop2): metadata I/O error in "xlog_bread_noalign" at daddr 0x20008 len 1 error 5 [ 2792.436610] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2792.452594] attempt to access beyond end of device [ 2792.474142] XFS (loop2): empty log check failed [ 2792.479258] loop1: rw=1, want=145, limit=112 09:25:54 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000}) [ 2792.489514] XFS (loop2): log mount/recovery failed: error -5 [ 2792.500659] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2792.513720] attempt to access beyond end of device [ 2792.536478] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2792.538501] loop1: rw=1, want=3801, limit=112 [ 2792.554208] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2792.564325] XFS (loop2): log mount failed [ 2792.593341] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2792.601467] attempt to access beyond end of device [ 2792.612459] loop1: rw=1, want=3830, limit=112 [ 2792.617284] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2792.627052] attempt to access beyond end of device [ 2792.632109] loop1: rw=1, want=3831, limit=112 [ 2792.637112] attempt to access beyond end of device [ 2792.643284] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2792.663146] loop1: rw=1, want=3832, limit=112 [ 2792.672315] attempt to access beyond end of device [ 2792.676473] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2792.684551] loop1: rw=1, want=3833, limit=112 09:25:54 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) [ 2792.685888] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2792.704287] attempt to access beyond end of device [ 2792.717918] loop1: rw=1, want=3854, limit=112 [ 2792.730176] attempt to access beyond end of device 09:25:54 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000065010000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2792.750436] loop1: rw=1, want=3855, limit=112 [ 2792.764785] attempt to access beyond end of device [ 2792.766626] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2792.783097] loop1: rw=1, want=3856, limit=112 09:25:54 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff}) 09:25:54 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x87', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2792.818322] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2792.833809] attempt to access beyond end of device [ 2792.853255] loop1: rw=1, want=3857, limit=112 [ 2792.873634] attempt to access beyond end of device [ 2792.883087] loop1: rw=1, want=3906, limit=112 [ 2792.890364] attempt to access beyond end of device [ 2792.895401] loop1: rw=1, want=3907, limit=112 [ 2792.904963] attempt to access beyond end of device [ 2792.953996] loop1: rw=1, want=3908, limit=112 [ 2792.968109] attempt to access beyond end of device [ 2792.980889] loop1: rw=1, want=3909, limit=112 [ 2792.985690] attempt to access beyond end of device [ 2792.985704] loop1: rw=1, want=3918, limit=112 [ 2792.996204] XFS (loop2): Mounting V4 Filesystem [ 2793.017592] attempt to access beyond end of device [ 2793.050535] attempt to access beyond end of device [ 2793.056413] loop2: rw=4096, want=206857, limit=32768 [ 2793.078412] loop1: rw=1, want=3919, limit=112 [ 2793.098539] attempt to access beyond end of device [ 2793.108141] XFS (loop2): metadata I/O error in "xlog_bread_noalign" at daddr 0x32808 len 1 error 5 [ 2793.111471] loop1: rw=1, want=3920, limit=112 [ 2793.139542] attempt to access beyond end of device [ 2793.157309] XFS (loop2): empty log check failed [ 2793.158351] loop1: rw=1, want=3921, limit=112 [ 2793.167505] XFS (loop2): log mount/recovery failed: error -5 [ 2793.184843] XFS (loop2): log mount failed 09:25:54 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x7000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2793.228812] attempt to access beyond end of device [ 2793.233823] loop1: rw=1, want=8017, limit=112 [ 2793.253594] attempt to access beyond end of device [ 2793.263518] loop1: rw=1, want=12113, limit=112 [ 2793.280638] attempt to access beyond end of device [ 2793.285662] loop1: rw=1, want=16209, limit=112 [ 2793.295168] attempt to access beyond end of device [ 2793.310958] loop1: rw=1, want=20305, limit=112 [ 2793.323787] attempt to access beyond end of device [ 2793.345661] loop1: rw=1, want=24401, limit=112 [ 2793.360033] attempt to access beyond end of device [ 2793.364989] loop1: rw=1, want=28497, limit=112 [ 2793.392228] attempt to access beyond end of device [ 2793.398792] loop1: rw=1, want=32593, limit=112 [ 2793.406972] attempt to access beyond end of device [ 2793.412252] loop1: rw=1, want=32993, limit=112 09:25:56 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:25:56 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd}) 09:25:56 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001100000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:25:56 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x88', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:25:56 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000066010000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:25:56 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0xf000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2794.711423] attempt to access beyond end of device [ 2794.718820] loop1: rw=1, want=130, limit=112 [ 2794.729378] attempt to access beyond end of device [ 2794.742438] loop1: rw=1, want=131, limit=112 [ 2794.782130] attempt to access beyond end of device 09:25:56 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) [ 2794.808099] loop1: rw=1, want=132, limit=112 09:25:56 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xa0', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2794.844190] attempt to access beyond end of device [ 2794.851495] XFS (loop0): Mounting V4 Filesystem [ 2794.863893] loop1: rw=1, want=133, limit=112 [ 2794.869922] XFS (loop0): totally zeroed log [ 2794.875982] XFS (loop2): Mounting V4 Filesystem [ 2794.883136] attempt to access beyond end of device [ 2794.914828] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2794.930353] loop1: rw=1, want=142, limit=112 [ 2794.940954] XFS (loop0): Unmount and run xfs_repair [ 2794.952328] attempt to access beyond end of device [ 2794.956986] attempt to access beyond end of device [ 2794.963489] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2794.974574] loop1: rw=1, want=143, limit=112 [ 2794.975762] loop2: rw=4096, want=208905, limit=32768 [ 2794.986096] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2795.001051] XFS (loop2): metadata I/O error in "xlog_bread_noalign" at daddr 0x33008 len 1 error 5 [ 2795.002315] attempt to access beyond end of device 09:25:56 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000}) [ 2795.035299] loop1: rw=1, want=144, limit=112 [ 2795.042220] XFS (loop2): empty log check failed [ 2795.045862] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2795.060624] XFS (loop2): log mount/recovery failed: error -5 [ 2795.061461] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2795.088306] buffer_io_error: 34 callbacks suppressed [ 2795.088316] Buffer I/O error on dev loop1, logical block 143, lost async page write [ 2795.097418] XFS (loop2): log mount failed [ 2795.107289] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2795.128501] attempt to access beyond end of device [ 2795.139526] loop1: rw=1, want=145, limit=112 [ 2795.151599] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2795.153707] Buffer I/O error on dev loop1, logical block 144, lost async page write [ 2795.168527] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2795.181068] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:25:56 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) [ 2795.196605] attempt to access beyond end of device [ 2795.207387] loop1: rw=1, want=2137, limit=112 [ 2795.212666] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2795.220357] attempt to access beyond end of device [ 2795.231076] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2795.232368] loop1: rw=1, want=2166, limit=112 [ 2795.245954] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2795.261042] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2795.268785] Buffer I/O error on dev loop1, logical block 2165, lost async page write [ 2795.277141] attempt to access beyond end of device [ 2795.282354] loop1: rw=1, want=2167, limit=112 [ 2795.287100] Buffer I/O error on dev loop1, logical block 2166, lost async page write [ 2795.295165] attempt to access beyond end of device [ 2795.300530] loop1: rw=1, want=2168, limit=112 [ 2795.305237] Buffer I/O error on dev loop1, logical block 2167, lost async page write [ 2795.314060] attempt to access beyond end of device [ 2795.325308] loop1: rw=1, want=2169, limit=112 [ 2795.376246] Buffer I/O error on dev loop1, logical block 2168, lost async page write [ 2795.407710] attempt to access beyond end of device [ 2795.421922] loop1: rw=1, want=2190, limit=112 [ 2795.436648] Buffer I/O error on dev loop1, logical block 2189, lost async page write 09:25:57 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xb8', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:25:57 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000070010000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2795.492829] attempt to access beyond end of device [ 2795.504933] loop1: rw=1, want=2191, limit=112 [ 2795.514099] Buffer I/O error on dev loop1, logical block 2190, lost async page write [ 2795.556323] attempt to access beyond end of device [ 2795.561269] loop1: rw=1, want=2192, limit=112 [ 2795.565770] Buffer I/O error on dev loop1, logical block 2191, lost async page write [ 2795.573910] attempt to access beyond end of device [ 2795.579340] loop1: rw=1, want=2193, limit=112 [ 2795.583929] Buffer I/O error on dev loop1, logical block 2192, lost async page write [ 2795.604187] attempt to access beyond end of device [ 2795.614329] loop1: rw=1, want=2242, limit=112 [ 2795.621758] attempt to access beyond end of device [ 2795.627302] loop1: rw=1, want=2243, limit=112 [ 2795.635307] attempt to access beyond end of device [ 2795.644679] loop1: rw=1, want=2244, limit=112 [ 2795.649728] attempt to access beyond end of device [ 2795.710706] loop1: rw=1, want=2245, limit=112 [ 2795.745710] attempt to access beyond end of device [ 2795.764522] loop1: rw=1, want=2254, limit=112 [ 2795.775950] attempt to access beyond end of device [ 2795.804048] loop1: rw=1, want=2255, limit=112 [ 2795.834840] attempt to access beyond end of device [ 2795.840077] loop1: rw=1, want=2256, limit=112 [ 2795.845503] attempt to access beyond end of device [ 2795.850907] loop1: rw=1, want=2257, limit=112 [ 2795.865795] attempt to access beyond end of device [ 2795.871007] loop1: rw=1, want=6353, limit=112 [ 2795.877102] XFS (loop2): Mounting V4 Filesystem [ 2795.884367] attempt to access beyond end of device [ 2795.889456] loop1: rw=1, want=10449, limit=112 [ 2795.921314] attempt to access beyond end of device [ 2795.921533] attempt to access beyond end of device [ 2795.927007] loop2: rw=4096, want=229385, limit=32768 [ 2795.941533] loop1: rw=1, want=14545, limit=112 [ 2795.954394] XFS (loop2): metadata I/O error in "xlog_bread_noalign" at daddr 0x38008 len 1 error 5 [ 2795.964992] attempt to access beyond end of device [ 2795.976087] loop1: rw=1, want=18641, limit=112 [ 2796.004595] XFS (loop2): empty log check failed [ 2796.009693] XFS (loop2): log mount/recovery failed: error -5 [ 2796.013894] attempt to access beyond end of device [ 2796.023256] XFS (loop2): log mount failed [ 2796.034591] loop1: rw=1, want=22737, limit=112 [ 2796.051636] attempt to access beyond end of device [ 2796.057035] loop1: rw=1, want=26833, limit=112 [ 2796.065594] attempt to access beyond end of device [ 2796.071869] loop1: rw=1, want=27513, limit=112 09:25:58 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:25:58 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff}) 09:25:58 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a0000000100001000000000010a0100000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:25:58 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xc4', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:25:58 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x13000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:25:58 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000071010000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2796.966866] attempt to access beyond end of device [ 2796.985217] loop1: rw=1, want=130, limit=112 [ 2797.001397] attempt to access beyond end of device [ 2797.011398] loop1: rw=1, want=131, limit=112 [ 2797.020529] attempt to access beyond end of device [ 2797.039562] loop1: rw=1, want=132, limit=112 [ 2797.044206] attempt to access beyond end of device [ 2797.052664] loop1: rw=1, want=133, limit=112 [ 2797.057480] attempt to access beyond end of device 09:25:58 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd}) [ 2797.067284] loop1: rw=1, want=142, limit=112 [ 2797.074842] attempt to access beyond end of device [ 2797.081724] XFS (loop0): Mounting V4 Filesystem [ 2797.084188] loop1: rw=1, want=143, limit=112 [ 2797.093430] attempt to access beyond end of device [ 2797.109914] loop1: rw=1, want=144, limit=112 [ 2797.145443] attempt to access beyond end of device [ 2797.151232] XFS (loop0): totally zeroed log [ 2797.166361] loop1: rw=1, want=145, limit=112 [ 2797.172353] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2797.179941] attempt to access beyond end of device [ 2797.187466] loop1: rw=1, want=3417, limit=112 [ 2797.193667] XFS (loop0): Unmount and run xfs_repair [ 2797.195809] attempt to access beyond end of device [ 2797.205830] loop1: rw=1, want=3446, limit=112 [ 2797.210790] attempt to access beyond end of device [ 2797.216062] loop1: rw=1, want=3447, limit=112 [ 2797.221199] attempt to access beyond end of device [ 2797.223469] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2797.226527] loop1: rw=1, want=3448, limit=112 [ 2797.237769] attempt to access beyond end of device [ 2797.243358] loop1: rw=1, want=3449, limit=112 [ 2797.252824] attempt to access beyond end of device [ 2797.258149] loop1: rw=1, want=3470, limit=112 [ 2797.264278] attempt to access beyond end of device [ 2797.277520] loop1: rw=1, want=3471, limit=112 [ 2797.284129] XFS (loop2): Mounting V4 Filesystem [ 2797.294724] attempt to access beyond end of device [ 2797.298206] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2797.300043] attempt to access beyond end of device [ 2797.314626] loop1: rw=1, want=3472, limit=112 [ 2797.319400] loop2: rw=4096, want=231433, limit=32768 [ 2797.324723] attempt to access beyond end of device [ 2797.330813] loop1: rw=1, want=3473, limit=112 [ 2797.335484] XFS (loop2): metadata I/O error in "xlog_bread_noalign" at daddr 0x38808 len 1 error 5 09:25:59 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) [ 2797.343314] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2797.345959] attempt to access beyond end of device [ 2797.358209] XFS (loop2): empty log check failed [ 2797.377464] loop1: rw=1, want=3522, limit=112 [ 2797.389545] XFS (loop2): log mount/recovery failed: error -5 09:25:59 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xc9', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2797.397375] attempt to access beyond end of device [ 2797.429914] loop1: rw=1, want=3523, limit=112 [ 2797.434576] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2797.445799] XFS (loop2): log mount failed [ 2797.452622] attempt to access beyond end of device [ 2797.465878] loop1: rw=1, want=3524, limit=112 09:25:59 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x20000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2797.486374] attempt to access beyond end of device [ 2797.493309] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2797.494471] loop1: rw=1, want=3525, limit=112 [ 2797.506534] attempt to access beyond end of device [ 2797.513953] loop1: rw=1, want=3534, limit=112 09:25:59 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000}) [ 2797.549827] attempt to access beyond end of device [ 2797.555813] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2797.569151] loop1: rw=1, want=3535, limit=112 [ 2797.578206] attempt to access beyond end of device [ 2797.587897] loop1: rw=1, want=3536, limit=112 [ 2797.592651] attempt to access beyond end of device [ 2797.597952] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2797.606441] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2797.614867] loop1: rw=1, want=3537, limit=112 [ 2797.624939] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2797.644302] attempt to access beyond end of device 09:25:59 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000030000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2797.649866] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2797.664595] loop1: rw=1, want=7633, limit=112 [ 2797.696688] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2797.720616] attempt to access beyond end of device [ 2797.725701] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2797.733911] loop1: rw=1, want=11729, limit=112 [ 2797.762836] attempt to access beyond end of device [ 2797.776175] loop1: rw=1, want=15825, limit=112 [ 2797.817403] attempt to access beyond end of device [ 2797.822431] loop1: rw=1, want=19921, limit=112 [ 2797.837916] attempt to access beyond end of device [ 2797.852926] loop1: rw=1, want=24017, limit=112 [ 2797.925254] attempt to access beyond end of device [ 2797.950422] loop1: rw=1, want=28113, limit=112 [ 2797.974444] XFS (loop2): Mounting V4 Filesystem [ 2798.001379] XFS (loop2): totally zeroed log [ 2798.011465] attempt to access beyond end of device [ 2798.033011] loop1: rw=1, want=32209, limit=112 [ 2798.038631] XFS (loop2): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2798.052924] attempt to access beyond end of device [ 2798.056688] XFS (loop2): Unmount and run xfs_repair [ 2798.062878] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2798.063971] loop1: rw=1, want=32993, limit=112 [ 2798.071734] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2798.082715] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2798.090966] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2798.099431] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2798.125127] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2798.136625] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2798.144785] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2798.153476] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2798.166397] XFS (loop2): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2798.185580] XFS (loop2): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2798.194334] XFS (loop2): Failed to read root inode 0xd88, error 117 09:26:00 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xe6', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:00 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) 09:26:00 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a0000000100001000000000011c0100000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:00 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x3f000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:26:00 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:26:00 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000002040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2799.069937] attempt to access beyond end of device [ 2799.074937] loop1: rw=1, want=130, limit=112 [ 2799.082997] attempt to access beyond end of device [ 2799.092616] loop1: rw=1, want=131, limit=112 [ 2799.114326] attempt to access beyond end of device 09:26:00 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff}) [ 2799.160409] loop1: rw=1, want=132, limit=112 [ 2799.175597] attempt to access beyond end of device [ 2799.188005] loop1: rw=1, want=133, limit=112 [ 2799.197231] attempt to access beyond end of device [ 2799.205873] loop1: rw=1, want=142, limit=112 [ 2799.213993] attempt to access beyond end of device [ 2799.257900] XFS (loop0): Mounting V4 Filesystem 09:26:01 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xef', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2799.279648] loop1: rw=1, want=143, limit=112 [ 2799.284461] XFS (loop0): totally zeroed log [ 2799.292924] XFS (loop2): Mounting V4 Filesystem [ 2799.303401] attempt to access beyond end of device [ 2799.312864] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2799.315192] XFS (loop2): totally zeroed log [ 2799.333890] loop1: rw=1, want=144, limit=112 [ 2799.347937] attempt to access beyond end of device [ 2799.355313] XFS (loop0): Unmount and run xfs_repair [ 2799.363790] loop1: rw=1, want=145, limit=112 [ 2799.370541] XFS (loop0): First 128 bytes of corrupted metadata buffer: 09:26:01 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd}) [ 2799.385965] XFS (loop2): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2799.390285] attempt to access beyond end of device [ 2799.401853] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2799.429442] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2799.438113] loop1: rw=1, want=4121, limit=112 [ 2799.456697] XFS (loop2): Unmount and run xfs_repair [ 2799.459321] attempt to access beyond end of device [ 2799.471338] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2799.475067] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2799.483381] loop1: rw=1, want=4150, limit=112 [ 2799.492829] attempt to access beyond end of device [ 2799.508613] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2799.516212] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2799.525123] loop1: rw=1, want=4151, limit=112 [ 2799.530648] attempt to access beyond end of device [ 2799.535739] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2799.548836] loop1: rw=1, want=4152, limit=112 [ 2799.559145] attempt to access beyond end of device [ 2799.564797] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2799.573387] loop1: rw=1, want=4153, limit=112 09:26:01 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) 09:26:01 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xf4', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2799.587652] attempt to access beyond end of device [ 2799.592944] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2799.595645] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2799.615987] loop1: rw=1, want=4174, limit=112 [ 2799.621675] attempt to access beyond end of device [ 2799.623844] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2799.630359] loop1: rw=1, want=4175, limit=112 [ 2799.639772] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2799.648428] attempt to access beyond end of device [ 2799.650351] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2799.661480] loop1: rw=1, want=4176, limit=112 [ 2799.671422] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2799.682529] attempt to access beyond end of device [ 2799.706372] loop1: rw=1, want=4177, limit=112 [ 2799.713291] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2799.724207] attempt to access beyond end of device [ 2799.726500] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2799.737724] loop1: rw=1, want=4226, limit=112 [ 2799.743992] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2799.751363] attempt to access beyond end of device [ 2799.757409] loop1: rw=1, want=4227, limit=112 [ 2799.764730] attempt to access beyond end of device [ 2799.772883] loop1: rw=1, want=4228, limit=112 [ 2799.791615] attempt to access beyond end of device 09:26:01 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000}) [ 2799.801184] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2799.803790] loop1: rw=1, want=4229, limit=112 [ 2799.816048] attempt to access beyond end of device [ 2799.825223] loop1: rw=1, want=4238, limit=112 [ 2799.831333] attempt to access beyond end of device [ 2799.845497] loop1: rw=1, want=4239, limit=112 [ 2799.850652] attempt to access beyond end of device [ 2799.853665] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2799.855787] loop1: rw=1, want=4240, limit=112 [ 2799.886977] attempt to access beyond end of device [ 2799.899199] loop1: rw=1, want=4241, limit=112 09:26:01 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}) [ 2799.937286] attempt to access beyond end of device [ 2799.955312] loop1: rw=1, want=8337, limit=112 [ 2799.976996] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:01 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xf8', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:01 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000300000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2799.985216] XFS (loop2): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2800.014050] attempt to access beyond end of device [ 2800.030964] loop1: rw=1, want=12433, limit=112 [ 2800.053836] XFS (loop2): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2800.108263] attempt to access beyond end of device [ 2800.114225] loop1: rw=1, want=16529, limit=112 09:26:01 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x6b6b8b00, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2800.168921] attempt to access beyond end of device [ 2800.177259] XFS (loop2): Failed to read root inode 0xd88, error 117 [ 2800.202577] loop1: rw=1, want=20625, limit=112 [ 2800.237596] attempt to access beyond end of device [ 2800.252815] loop1: rw=1, want=24721, limit=112 [ 2800.286238] attempt to access beyond end of device [ 2800.307219] loop1: rw=1, want=28817, limit=112 [ 2800.326241] attempt to access beyond end of device [ 2800.331942] loop1: rw=1, want=32913, limit=112 [ 2800.338515] XFS (loop0): Mounting V4 Filesystem [ 2800.346068] XFS (loop0): totally zeroed log [ 2800.363738] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2800.370460] attempt to access beyond end of device [ 2800.391569] loop1: rw=1, want=32993, limit=112 [ 2800.416420] XFS (loop0): Unmount and run xfs_repair [ 2800.443650] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2800.461873] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2800.471197] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2800.479574] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2800.488081] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2800.496233] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2800.524866] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2800.546393] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2800.556138] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2800.583268] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2800.602250] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2800.625711] XFS (loop0): Failed to read root inode 0xd88, error 117 09:26:03 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xfe', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$SIOCAX25CTLCON(r1, 0x89e8, &(0x7f00000000c0)={@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x67, 0x9, 0x5, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) sendto$ax25(r1, &(0x7f0000000140), 0x0, 0x4090, &(0x7f0000000200)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x401}, [@bcast, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) 09:26:03 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000005040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:03 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x80040000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:26:03 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:26:03 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001800400000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2801.588342] attempt to access beyond end of device [ 2801.593358] loop1: rw=1, want=130, limit=112 [ 2801.610842] buffer_io_error: 56 callbacks suppressed [ 2801.610865] Buffer I/O error on dev loop1, logical block 129, lost async page write 09:26:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x20000002000000, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x0, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) [ 2801.695073] attempt to access beyond end of device [ 2801.709921] loop1: rw=1, want=131, limit=112 09:26:03 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x1a', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2801.751304] Buffer I/O error on dev loop1, logical block 130, lost async page write [ 2801.775967] XFS (loop0): Mounting V4 Filesystem [ 2801.783957] attempt to access beyond end of device [ 2801.805332] XFS (loop0): totally zeroed log [ 2801.807452] loop1: rw=1, want=132, limit=112 [ 2801.817286] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2801.817296] XFS (loop0): Unmount and run xfs_repair [ 2801.836082] Buffer I/O error on dev loop1, logical block 131, lost async page write [ 2801.844755] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2801.859311] attempt to access beyond end of device [ 2801.864483] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2801.883111] loop1: rw=1, want=133, limit=112 [ 2801.892621] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x2, 0x4c0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r1, 0x114, 0xa, &(0x7f00000000c0), 0x1) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) [ 2801.908534] Buffer I/O error on dev loop1, logical block 132, lost async page write [ 2801.923694] XFS (loop2): Mounting V4 Filesystem 09:26:03 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs&', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2801.956175] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2801.969901] attempt to access beyond end of device [ 2801.985183] loop1: rw=1, want=142, limit=112 09:26:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x5, 0x8000) ioctl$KVM_SET_VAPIC_ADDR(r1, 0x4008ae93, &(0x7f00000000c0)) [ 2802.002108] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2802.012768] Buffer I/O error on dev loop1, logical block 141, lost async page write [ 2802.028092] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2802.042270] attempt to access beyond end of device [ 2802.064607] loop1: rw=1, want=143, limit=112 [ 2802.075180] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2802.088277] Buffer I/O error on dev loop1, logical block 142, lost async page write [ 2802.099924] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2802.111349] attempt to access beyond end of device [ 2802.120692] loop1: rw=1, want=144, limit=112 [ 2802.125316] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2802.135673] Buffer I/O error on dev loop1, logical block 143, lost async page write [ 2802.150203] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2802.159724] XFS (loop2): totally zeroed log [ 2802.159787] attempt to access beyond end of device [ 2802.169673] loop1: rw=1, want=145, limit=112 [ 2802.174209] Buffer I/O error on dev loop1, logical block 144, lost async page write [ 2802.189362] attempt to access beyond end of device [ 2802.194525] loop1: rw=1, want=2009, limit=112 [ 2802.199642] XFS (loop2): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 09:26:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) [ 2802.203721] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2802.220121] attempt to access beyond end of device [ 2802.225274] XFS (loop2): Unmount and run xfs_repair [ 2802.231543] loop1: rw=1, want=2038, limit=112 [ 2802.236140] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2802.245341] Buffer I/O error on dev loop1, logical block 2037, lost async page write [ 2802.254340] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2802.265415] attempt to access beyond end of device [ 2802.275295] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2802.287338] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2802.310514] loop1: rw=1, want=2039, limit=112 09:26:04 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs(', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2802.315049] Buffer I/O error on dev loop1, logical block 2038, lost async page write [ 2802.339494] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2802.350238] attempt to access beyond end of device [ 2802.356008] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:04 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x10003, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) r1 = syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x80000000, 0x8000) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f0000000300)={0x5, 0x75, 0x2}) r2 = syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x4, 0x16000) ioctl$VIDIOC_STREAMON(r2, 0x40045612, &(0x7f0000000240)=0x10000005) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x10800, 0x0) connect$pppoe(r1, &(0x7f0000000480)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, 'veth1_to_bond\x00'}}, 0x1e) ioctl$KVM_GET_EMULATED_CPUID(r3, 0xc008ae09, &(0x7f00000000c0)=""/187) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20, 0x0, 0x7, {0x0, 0x3}}, 0x20) rt_sigprocmask(0x0, &(0x7f00000004c0)={0x8}, &(0x7f0000000500), 0x8) getsockopt$inet_tcp_buf(r2, 0x6, 0x21, &(0x7f0000000540)=""/66, &(0x7f00000005c0)=0x42) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r3, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800100}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, r4, 0x300, 0x70bd2a, 0x25dfdbfd, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x2400c000}, 0x8080) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f0000000280)={'team_slave_0\x00', 0x100000001}) [ 2802.364487] loop1: rw=1, want=2040, limit=112 [ 2802.372072] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2802.380527] attempt to access beyond end of device [ 2802.385844] loop1: rw=1, want=2041, limit=112 [ 2802.390478] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2802.398800] attempt to access beyond end of device [ 2802.405517] loop1: rw=1, want=2062, limit=112 [ 2802.410326] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2802.418966] attempt to access beyond end of device [ 2802.423994] loop1: rw=1, want=2063, limit=112 [ 2802.428641] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2802.436922] attempt to access beyond end of device [ 2802.436935] loop1: rw=1, want=2064, limit=112 [ 2802.436966] attempt to access beyond end of device [ 2802.436977] loop1: rw=1, want=2065, limit=112 [ 2802.437056] attempt to access beyond end of device [ 2802.461056] XFS (loop2): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2802.461110] loop1: rw=1, want=2114, limit=112 [ 2802.475171] attempt to access beyond end of device [ 2802.486386] loop1: rw=1, want=2115, limit=112 [ 2802.490985] attempt to access beyond end of device [ 2802.536316] loop1: rw=1, want=2116, limit=112 [ 2802.540850] attempt to access beyond end of device [ 2802.545775] loop1: rw=1, want=2117, limit=112 [ 2802.556410] XFS (loop2): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2802.561673] attempt to access beyond end of device [ 2802.574072] XFS (loop2): Failed to read root inode 0xd88, error 117 [ 2802.580271] loop1: rw=1, want=2126, limit=112 [ 2802.625964] attempt to access beyond end of device [ 2802.641886] loop1: rw=1, want=2127, limit=112 [ 2802.659387] attempt to access beyond end of device [ 2802.669894] loop1: rw=1, want=2128, limit=112 09:26:04 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000007040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:04 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000500000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2802.703979] attempt to access beyond end of device [ 2802.709075] loop1: rw=1, want=2129, limit=112 [ 2802.728951] attempt to access beyond end of device [ 2802.733917] loop1: rw=1, want=6225, limit=112 [ 2802.745216] attempt to access beyond end of device [ 2802.750768] loop1: rw=1, want=10321, limit=112 [ 2802.763789] attempt to access beyond end of device [ 2802.768746] loop1: rw=1, want=14417, limit=112 [ 2802.779436] attempt to access beyond end of device [ 2802.784368] loop1: rw=1, want=18513, limit=112 [ 2802.794462] attempt to access beyond end of device [ 2802.799490] loop1: rw=1, want=22609, limit=112 [ 2802.809431] attempt to access beyond end of device [ 2802.814355] loop1: rw=1, want=26705, limit=112 [ 2802.889359] attempt to access beyond end of device [ 2802.913701] loop1: rw=1, want=30801, limit=112 [ 2802.953208] attempt to access beyond end of device [ 2802.967974] loop1: rw=1, want=32993, limit=112 [ 2802.988787] XFS (loop0): Mounting V4 Filesystem [ 2803.008976] XFS (loop0): totally zeroed log [ 2803.031372] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2803.050035] XFS (loop0): Unmount and run xfs_repair [ 2803.057846] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2803.066711] XFS (loop2): Mounting V4 Filesystem [ 2803.092759] XFS (loop2): totally zeroed log [ 2803.109784] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2803.118269] XFS (loop2): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2803.152017] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2803.162268] XFS (loop2): Unmount and run xfs_repair [ 2803.172168] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2803.181084] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2803.193417] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2803.203715] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2803.215645] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2803.227257] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2803.230644] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2803.243680] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2803.245180] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2803.265804] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2803.266381] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2803.274140] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2803.296146] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2803.301907] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2803.317573] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2803.320967] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2803.334754] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2803.335670] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2803.350409] XFS (loop2): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2803.359782] XFS (loop2): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2803.364348] XFS (loop2): Failed to read root inode 0xd88, error 117 09:26:05 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:26:05 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) modify_ldt$write2(0x11, &(0x7f0000000080)={0x6, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x10001, 0x10000, 0x6, 0x2, 0x1, 0xffffffffffffff00}, 0x10) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) 09:26:05 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfsD', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:05 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x8cffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:26:05 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000008040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:05 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000600000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:05 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$TIOCGETD(r0, 0x5424, &(0x7f00000000c0)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)) ioctl$KDENABIO(r1, 0x4b36) 09:26:05 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x6) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x9}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x8080, 0x0) 09:26:05 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0xe5ffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2803.972756] XFS (loop0): Mounting V4 Filesystem 09:26:05 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:26:05 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfsv', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2804.011373] XFS (loop0): totally zeroed log [ 2804.021124] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2804.048181] XFS (loop0): Unmount and run xfs_repair [ 2804.068722] XFS (loop2): Mounting V4 Filesystem [ 2804.080432] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2804.096997] XFS (loop2): totally zeroed log 09:26:05 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x1, 0x0) accept4$unix(r1, &(0x7f00000000c0), &(0x7f0000000140)=0x6e, 0x80800) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000008) [ 2804.113488] XFS (loop2): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2804.114133] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2804.173891] XFS (loop2): Unmount and run xfs_repair [ 2804.193203] XFS (loop2): First 128 bytes of corrupted metadata buffer: 09:26:05 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs|', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2804.233198] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2804.249697] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2804.276112] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2804.284288] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2804.284301] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2804.284312] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2804.284324] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2804.284335] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:06 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4024}) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000200)) [ 2804.284346] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2804.284359] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2804.292954] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2804.351541] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2804.359687] XFS (loop2): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2804.369621] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2804.408833] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2804.422221] XFS (loop2): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2804.431131] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2804.461457] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2804.471277] XFS (loop2): Failed to read root inode 0xd88, error 117 [ 2804.495283] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2804.504456] XFS (loop0): Failed to read root inode 0xd88, error 117 09:26:06 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) ioctl$TIOCEXCL(r0, 0x540c) 09:26:06 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xb8', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:06 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001010a00000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:06 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000009040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:06 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x4) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) 09:26:06 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xbe', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2805.060305] XFS (loop0): Mounting V4 Filesystem [ 2805.082414] XFS (loop0): totally zeroed log [ 2805.108347] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2805.155085] XFS (loop2): Mounting V4 Filesystem [ 2805.167194] XFS (loop0): Unmount and run xfs_repair [ 2805.182968] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2805.183354] XFS (loop2): totally zeroed log [ 2805.194810] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2805.214800] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2805.233495] XFS (loop2): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2805.256676] XFS (loop2): Unmount and run xfs_repair [ 2805.261788] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2805.280802] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2805.295034] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2805.303619] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2805.312291] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2805.330958] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2805.336420] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2805.346135] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2805.356404] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2805.386656] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2805.393307] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2805.406475] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2805.427667] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:07 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0xf6ffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:26:07 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x20000000) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) socket$vsock_stream(0x28, 0x1, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x4000, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f00000000c0)) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000100)=0x1) 09:26:07 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xe0', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:07 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(0x0, &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) [ 2805.443334] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2805.473000] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2805.491893] XFS (loop2): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2805.517665] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2805.530020] XFS (loop2): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 09:26:07 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x8, 0x600000) write$uinput_user_dev(r1, &(0x7f0000000200)={'syz1\x00', {0x8, 0x101, 0x0, 0x8}, 0x27, [0x9, 0x5, 0x80000001, 0x7, 0x7ac, 0xffff, 0x6, 0x1, 0xffffffff, 0x8a, 0x1, 0x4, 0x9b35, 0x6, 0x8000, 0x8, 0x80000001, 0x3, 0x40, 0xfffffffffffffffd, 0x11, 0x85, 0x2, 0x544a, 0x10000, 0x1, 0x7, 0x3, 0x1, 0x20, 0x40, 0x6, 0x5, 0x8000, 0xfffffffffffff800, 0x196, 0x8, 0x8, 0x7, 0x1, 0x3, 0x1, 0x20, 0x4, 0x7fff, 0x100000000, 0x8, 0x1f, 0x7, 0x7ff, 0x7ff, 0x4, 0x5, 0x1, 0x7, 0xffffffffffffffff, 0x7ff, 0x1, 0xffff, 0x6, 0x8000, 0x6, 0x1000, 0x800], [0x1, 0x5, 0x3, 0x0, 0x2, 0xec6a, 0xd17, 0xf22, 0x9, 0x8001, 0x40, 0x280000000000000, 0x5, 0x1ff, 0x8001, 0x100, 0x2a3, 0xc5, 0xfffffffffffffffd, 0x2, 0x4, 0xac0, 0xa05, 0x7, 0x3, 0xffffffffffffffff, 0x4, 0xc000000000000000, 0x40, 0x100000001, 0x9, 0x2, 0x7, 0xfffffffffffffffa, 0x83, 0x1000, 0x8000, 0x6, 0x5, 0x2, 0x7fffffff, 0xfffffffffffffd11, 0x7, 0xfffffffffffffc01, 0x10000, 0x7fffffff, 0x4, 0x80000001, 0xfffffffffffffffb, 0x1, 0x5, 0x73e, 0x0, 0x1, 0x39fc, 0xd5f, 0x81, 0x20, 0x1ff, 0x1d15fd99, 0x7ff, 0x7f, 0x5], [0x3f, 0x1, 0xf16d, 0xa5, 0x10000, 0x5, 0x1, 0x3, 0x7, 0x8, 0x8000, 0xcbe, 0xda87, 0x0, 0x9, 0x7, 0x3c5, 0x3, 0x4, 0x800, 0x8, 0x9, 0x7f, 0x1, 0xffffffff00000000, 0x7fffffff, 0x400, 0xfffffffffffffbff, 0x9, 0x3, 0x5, 0x1, 0x0, 0x2, 0x7, 0x8, 0x8, 0xd3, 0x0, 0xfffffffffffffffc, 0x5, 0x1, 0x101, 0x6, 0x61, 0x3, 0xffffffff, 0x0, 0x0, 0x1, 0x6, 0x9, 0x10001, 0x0, 0x2, 0x400, 0x6, 0xe9, 0x8, 0x401, 0x0, 0x44a21841, 0x9, 0x6], [0x1000, 0x5, 0x3f, 0x6, 0x0, 0xffff, 0xa0be, 0x4, 0x5, 0x0, 0x3, 0x3, 0x75b5cfc, 0x4f, 0x9, 0x6, 0x1, 0x9, 0x6, 0x80000001, 0x10000, 0x4, 0x9, 0x6, 0x3, 0x2, 0x1, 0x8, 0x80000001, 0x80, 0x9, 0x80000001, 0x848, 0x7, 0x4, 0x2, 0x40, 0x78c0, 0x6, 0x10000, 0xaa, 0xe3e9, 0x1000, 0x1, 0x3ff, 0xfffffffffffff801, 0x3f57e6b0, 0xfffffffffffffffd, 0x9b, 0xfffffffffffffffd, 0x6, 0xffff, 0x3ff, 0x9, 0x8, 0x2, 0x5, 0xffffffffffff0001, 0x80000000, 0x7, 0x6, 0x7, 0x5]}, 0x45c) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) [ 2805.555754] XFS (loop2): Failed to read root inode 0xd88, error 117 [ 2805.563053] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 09:26:07 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xe8', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2805.608636] XFS (loop0): Failed to read root inode 0xd88, error 117 09:26:07 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x19) 09:26:07 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001011c00000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:07 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000a040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:07 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000080)={0x9c, 0x8, 0x2818, 0x88e9, 0x19, 0x0, 0x9, 0x8, 0x7f, 0x1, 0x8, 0x3}) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) 09:26:07 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xf8', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:07 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x400042) connect$bt_l2cap(r1, &(0x7f00000000c0)={0x1f, 0x8001, {0xffffffffffff0001, 0x5, 0x2, 0x7, 0x7, 0x3ff}, 0xb97, 0xb029}, 0xe) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) [ 2806.164470] XFS (loop0): Mounting V4 Filesystem [ 2806.192105] XFS (loop0): totally zeroed log [ 2806.221189] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2806.323863] XFS (loop0): Unmount and run xfs_repair [ 2806.352369] XFS (loop2): Mounting V4 Filesystem [ 2806.360829] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2806.372699] XFS (loop2): totally zeroed log [ 2806.382456] XFS (loop2): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2806.395486] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2806.410010] XFS (loop2): Unmount and run xfs_repair [ 2806.431536] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2806.452084] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2806.464949] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2806.481385] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2806.491971] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2806.505243] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2806.513830] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2806.524745] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2806.536367] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2806.543568] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2806.553653] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2806.578755] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2806.590226] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2806.604806] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2806.616445] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2806.621587] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2806.624599] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2806.649302] XFS (loop2): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2806.663111] XFS (loop2): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2806.676513] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2806.686389] XFS (loop2): Failed to read root inode 0xd88, error 117 09:26:08 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x14', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:08 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x0, 0x2) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000100)="4360dcf3a93d2e8f7a93dfe2586709be", 0x10) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000080)) 09:26:08 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0xf7000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:26:08 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(0x0, &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) [ 2806.706436] XFS (loop0): Failed to read root inode 0xd88, error 117 09:26:08 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x10000, 0x10000) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}) 09:26:08 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000b040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:08 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001003f00000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:08 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x18', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:08 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(0x0, &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:26:08 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) r1 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x3, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f00000001c0)=r1) ioctl$SG_GET_LOW_DMA(r1, 0x227a, &(0x7f0000000180)) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x10, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_L='version=9p2000.L'}], [{@context={'context', 0x3d, 'user_u'}}, {@appraise='appraise'}, {@dont_appraise='dont_appraise'}, {@euid_lt={'euid<', r2}}]}}) [ 2807.172359] XFS (loop2): Mounting V4 Filesystem [ 2807.194225] XFS (loop0): Mounting V4 Filesystem [ 2807.204168] XFS (loop2): totally zeroed log [ 2807.214439] XFS (loop0): totally zeroed log [ 2807.219462] XFS (loop2): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2807.238555] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2807.291236] XFS (loop0): Unmount and run xfs_repair [ 2807.316461] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2807.326720] XFS (loop2): Unmount and run xfs_repair 09:26:09 executing program 5: r0 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x2, 0x2) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)) [ 2807.358491] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2807.366142] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2807.392337] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:09 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs,', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2807.425800] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2807.448296] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2807.455273] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:09 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) bind$rose(r1, &(0x7f00000000c0)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x5, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x40) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) [ 2807.485092] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2807.495502] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2807.505743] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2807.528685] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2807.575859] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2807.579969] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2807.596506] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2807.612856] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:09 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x284001, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000000c0)={0x8, 0x77a1f559, 0x5, 0xfffffffffffff407, 0x1, 0x0, 0x1, 0x5, 0x2, 0x5, 0x2}, 0xb) [ 2807.625369] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2807.631295] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2807.667249] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2807.675508] XFS (loop2): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2807.686399] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2807.712916] XFS (loop2): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2807.722437] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2807.757565] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2807.764003] XFS (loop2): Failed to read root inode 0xd88, error 117 09:26:09 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0xfeffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:26:09 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs0', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:09 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x400, 0x80000) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) r3 = getpgid(0xffffffffffffffff) ptrace$setopts(0x4200, r3, 0x8, 0x4) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) 09:26:09 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', 0x0, 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:26:09 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001048000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:09 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000050000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:09 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) 09:26:10 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', 0x0, 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) [ 2808.340940] XFS (loop0): Mounting V4 Filesystem [ 2808.367403] XFS (loop0): totally zeroed log 09:26:10 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfsN', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2808.392442] XFS (loop2): Mounting V4 Filesystem 09:26:10 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) syz_open_pts(r0, 0x80) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) [ 2808.418262] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2808.449076] XFS (loop2): totally zeroed log [ 2808.457436] XFS (loop0): Unmount and run xfs_repair [ 2808.473654] XFS (loop2): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2808.481703] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2808.495779] XFS (loop2): Unmount and run xfs_repair [ 2808.526371] XFS (loop2): First 128 bytes of corrupted metadata buffer: 09:26:10 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', 0x0, 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) [ 2808.567556] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2808.573878] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2808.598969] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2808.605304] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2808.624847] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2808.630476] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2808.656222] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2808.676499] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2808.693104] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2808.716552] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:10 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x210002) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000001c0)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000080)) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x211) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x20800) ioctl$TCSBRK(r1, 0x5409, 0x3) write$P9_RLERROR(r2, &(0x7f0000000140)={0x13, 0x7, 0x1, {0xa, '/dev/ptmx\x00'}}, 0x13) [ 2808.735114] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2808.752709] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2808.762697] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2808.796545] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2808.809705] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2808.826124] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2808.836922] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2808.841276] XFS (loop2): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2808.875097] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2808.887208] XFS (loop2): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2808.901954] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2808.908714] XFS (loop2): Failed to read root inode 0xd88, error 117 09:26:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0xffff8000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:26:10 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfsP', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:10 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:26:10 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x2) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000080)="0bcfad96dfef5c11c1026c3aec36e610314e7ce7d45a3ba9328e17c3d697b9d048b3179d642031960307d808f1be60f9a269cbd3bdaeb466f624290f84855fc829cf64cbbd02f4ac538138a88ca7c86a1e35f6cd32a86ceddb678187f44575dfdd63625ddce667e6f7e41445a26db50447dde896f2e2d9c532ce02d8d29feaba63ae4fa0ed7d1b7fa75eac4dd1fb31911bf0bdd93f4c9992d63636a14223e048035f8a272ca80400c12453405d8b35e6e88239ccc7811f15424b5ba9d1f19f400f22dc92dfbbf49b66935e099b05275c87443f24c917205dae7e464c88e3e389855992df5eb80681681af0617056b2a4f60f") ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) 09:26:10 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c19000000000000000a0000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:10 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001088000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:11 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x420000, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000000)=0x5) [ 2809.409390] FAT-fs (loop1): bogus number of reserved sectors [ 2809.415315] FAT-fs (loop1): Can't find a valid FAT filesystem 09:26:11 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x222880, 0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) [ 2809.503984] XFS (loop2): Mounting V4 Filesystem 09:26:11 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfsU', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:11 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) [ 2809.579433] XFS (loop2): totally zeroed log [ 2809.584853] XFS (loop2): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2809.624065] XFS (loop2): Unmount and run xfs_repair [ 2809.642173] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2809.651770] XFS (loop0): Mounting V4 Filesystem [ 2809.670157] XFS (loop0): totally zeroed log 09:26:11 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) ioctl$KDSKBLED(r0, 0x4b65, 0x3) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0xfffffffffffffff7, 0x400000) ioctl$KVM_GET_NR_MMU_PAGES(r1, 0xae45, 0x8) [ 2809.687631] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2809.717293] FAT-fs (loop1): bogus number of reserved sectors [ 2809.717337] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2809.723103] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2809.744235] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2809.769260] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2809.807866] XFS (loop0): Unmount and run xfs_repair 09:26:11 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x8c', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2809.837427] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2809.843152] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2809.919299] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2809.921534] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2809.963840] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2809.989833] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2810.000441] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2810.012180] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2810.020669] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2810.029110] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2810.037661] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2810.046001] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2810.054502] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2810.065294] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2810.084708] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2810.088180] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2810.102251] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2810.115931] XFS (loop2): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2810.132443] XFS (loop2): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2810.157979] XFS (loop2): Failed to read root inode 0xd88, error 117 09:26:12 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0xffffc000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:26:12 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) utimes(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={{0x0, 0x7530}, {0x77359400}}) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000200)={0x9, {{0x2, 0x4e22, @local}}, {{0x2, 0x401, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x108) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) ioctl$RTC_WIE_OFF(r1, 0x7010) 09:26:12 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xb8', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:12 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a0000000100001000000000016b6b6b000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:12 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000140000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:12 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:26:12 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x7, 0x6a4480) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000002c0)={0x0, 0xfff, 0x20}, &(0x7f0000000300)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000340)={r2, 0xff, 0x8f}, &(0x7f0000000380)=0x8) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) r3 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000240)={0x0, 0x1, {0x1f, 0x38, 0x13, 0x12, 0x3, 0x9, 0x0, 0x132, 0x1}}) write$FUSE_INIT(r3, &(0x7f0000000140)={0x50, 0xffffffffffffffff, 0x2, {0x7, 0x1c, 0x7fffffff, 0x200002, 0x2, 0x3, 0xfffffffffffffff7, 0xffffffffffffff44}}, 0x50) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)=0xd) ioctl$TCSETS(r5, 0x5423, &(0x7f0000000040)) pipe2(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r7, &(0x7f00000004c0)=ANY=[@ANYBLOB="7f454c460000000000faffffff0000000300060000000000000000003800000000000000e3000000000020000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000001f000000000000000000000000000000"], 0x78) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f0000000280), &(0x7f0000000500), 0x1000) ioctl$DRM_IOCTL_AGP_FREE(r6, 0x40206435, &(0x7f00000000c0)={0x4, 0x0, 0x0, 0x9}) socket$inet6_dccp(0xa, 0x6, 0x0) [ 2810.989924] FAT-fs (loop1): bogus number of reserved sectors [ 2810.995857] FAT-fs (loop1): Can't find a valid FAT filesystem 09:26:12 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xbe', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2811.102629] XFS (loop2): Mounting V4 Filesystem [ 2811.113543] XFS (loop0): Mounting V4 Filesystem [ 2811.134793] XFS (loop2): totally zeroed log [ 2811.151143] XFS (loop0): totally zeroed log 09:26:12 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:26:12 executing program 5: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000001c0)=0x1ff, 0x4) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x98382, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000180)) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x101, 0x290103) ioctl$TCSETS(r1, 0x5402, &(0x7f00000000c0)={0x7, 0xae85, 0xfffffffffffffffa, 0x7, 0x16, 0xffffffffffffff51, 0x5, 0x3, 0x7, 0x7, 0x5, 0x10001}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x400041, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000000)) [ 2811.217044] XFS (loop2): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2811.237742] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2811.316744] XFS (loop2): Unmount and run xfs_repair [ 2811.324116] XFS (loop0): Unmount and run xfs_repair [ 2811.342160] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2811.368093] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2811.377255] FAT-fs (loop1): bogus number of reserved sectors [ 2811.383101] FAT-fs (loop1): Can't find a valid FAT filesystem 09:26:13 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xd4', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2811.424506] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2811.444436] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:13 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) syz_open_pts(r0, 0x0) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) [ 2811.502262] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2811.517484] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2811.550242] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2811.559846] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2811.592489] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2811.626761] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2811.716402] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2811.724713] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2811.733113] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2811.766979] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2811.805494] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2811.814055] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2811.849320] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2811.858495] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2811.904760] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2811.916769] XFS (loop2): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2811.936772] XFS (loop2): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2811.940319] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 09:26:13 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0xfffff000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:26:13 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:26:13 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x100, 0x0) bind$vsock_stream(r1, &(0x7f0000000080), 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_rose_SIOCDELRT(r1, 0x890c, &(0x7f0000000200)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, @bcast, @rose={'rose', 0x0}, 0x5, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @null, @bcast]}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'syzkaller0\x00', r2}) [ 2811.950896] XFS (loop2): Failed to read root inode 0xd88, error 117 [ 2811.986921] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2812.000256] QAT: Invalid ioctl [ 2812.003906] QAT: Invalid ioctl [ 2812.014485] QAT: Invalid ioctl [ 2812.018425] QAT: Invalid ioctl [ 2812.182691] FAT-fs (loop1): bogus number of reserved sectors [ 2812.188612] FAT-fs (loop1): Can't find a valid FAT filesystem 09:26:13 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000010000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:13 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xdc', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:13 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}) sysfs$2(0x2, 0x1c000000000, &(0x7f0000000200)=""/4096) setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:syslogd_exec_t:s0\x00', 0x24, 0x3) 09:26:13 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000003440000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:14 executing program 5: r0 = socket$inet(0x2, 0x6, 0x4) pread64(r0, &(0x7f00000000c0)=""/87, 0x57, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x1ff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xf) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000080)) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)) 09:26:14 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) [ 2812.698665] XFS (loop2): Mounting V4 Filesystem [ 2812.759907] XFS (loop2): totally zeroed log [ 2812.772060] XFS (loop0): Mounting V4 Filesystem [ 2812.795589] XFS (loop0): totally zeroed log 09:26:14 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xf8', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2812.819662] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2812.821403] XFS (loop2): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2812.841221] XFS (loop0): Unmount and run xfs_repair [ 2812.866842] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2812.880383] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2812.888769] XFS (loop2): Unmount and run xfs_repair [ 2812.895044] XFS (loop2): First 128 bytes of corrupted metadata buffer: 09:26:14 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x1ff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}) [ 2812.931689] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2812.951731] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2812.969912] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2813.019650] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2813.029882] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2813.063472] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2813.073280] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2813.088537] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2813.100075] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:14 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/193, 0xc1}, {&(0x7f0000000200)=""/158, 0x9e}, {&(0x7f00000002c0)=""/138, 0x8a}], 0x3) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x4, 0x0, 0x100000000000}) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) fcntl$getown(r2, 0x9) write$cgroup_int(r1, &(0x7f00000003c0)=0x7fff, 0x12) [ 2813.106602] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2813.161830] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2813.165747] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2813.225672] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2813.250856] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2813.284752] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2813.295179] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2813.314071] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2813.321057] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2813.342436] XFS (loop2): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2813.353833] XFS (loop2): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2813.405981] XFS (loop2): Failed to read root inode 0xd88, error 117 [ 2813.433041] FAT-fs (loop1): bogus number of reserved sectors [ 2813.438935] FAT-fs (loop1): Can't find a valid FAT filesystem 09:26:15 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0xffffff8c, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:26:15 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:15 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCCONS(r0, 0x541d) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) 09:26:15 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000020000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:15 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000021900000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:15 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x10000, 0x800) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, @bcast, @bpq0='bpq0\x00', 0xfffffffffffffffc, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@default, @null, @null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @bcast]}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}) 09:26:15 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, &(0x7f0000000040), 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) [ 2813.813082] XFS (loop0): Mounting V4 Filesystem 09:26:15 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0xffffffe5, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2813.843727] XFS (loop0): totally zeroed log [ 2813.862991] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2813.865819] FAT-fs (loop1): bogus number of reserved sectors [ 2813.878532] FAT-fs (loop1): Can't find a valid FAT filesystem 09:26:15 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5412, &(0x7f00000000c0)={0x100, 0xfffffffffffffffd, 0x1, 0x0, 0x2000, 0x8000000000007, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1}) [ 2813.895949] XFS (loop4): Mounting V4 Filesystem [ 2813.898452] XFS (loop0): Unmount and run xfs_repair [ 2813.920271] XFS (loop2): Mounting V4 Filesystem [ 2813.923966] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2813.933999] XFS (loop4): totally zeroed log [ 2813.940119] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2813.946633] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2813.956700] XFS (loop2): totally zeroed log [ 2813.991198] XFS (loop2): Failed to read root inode 0x1900000000000d88, error 22 [ 2814.012457] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2814.050837] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2814.073513] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2814.082049] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:15 executing program 5: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x80, 0x0) getsockname$packet(r0, &(0x7f0000000280), &(0x7f00000002c0)=0x14) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xf) ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x200) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r1, 0xbe, 0xfffffffffffffff9, 0x189, 0x8}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)) [ 2814.099397] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2814.138786] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2814.181899] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2814.202219] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2814.223300] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2814.232414] XFS (loop0): Failed to read root inode 0xd88, error 117 09:26:16 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x10', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:16 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000021804000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:16 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000080)={0xb9, 0x2, "07b65fca6c6c3d02727c5b6cbd7a6bf3eb8330127da15632e731b3684ab6d2ff82a4bb792bd0e099140dbf0125123b129b27c8f06b0a4166b26a4d7c959693b2d165f9837e10eb929621e1fe04044c7590a4bc6d563dde2b9cb496ab917f8c01e98638b96b066fd458310628735bb04b585e81ef678b1bce4b975062db6190af8399e52f787f71a07527606e8915adb49e815311710c7010c91c6236e368c81df8bd74800cce28af556f529ead7d9e89d7"}, 0x400400) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) [ 2814.429153] XFS (loop0): Mounting V4 Filesystem [ 2814.449927] XFS (loop0): AIL initialisation failed: error -12 [ 2814.488424] XFS (loop0): log mount failed 09:26:16 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x2, 0x224c80) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000200)={0x0, 0x90, "150cf27cfe60c1fe00f115743fb171eb541d890c07e948590b8e6cd8110d61186d5b4a8d81db44a6fb24254dfb55b3f7eeb806cf46daccc6119f87347981f386117e78465b984d273eee03713e3559d7575874ec59ab67c91d832e0ed5f4b9ad17b36be7e4659e20449fd3312f5a3e94552cb2d40d61b42a6d4053af46074302267c9d14fe40503836c8ae2be6d188a1"}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000180)={r2, 0xfe23, 0x6, [0xffffffffffffffff, 0x80, 0x1, 0x81, 0x7, 0x1]}, 0x14) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) 09:26:16 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000030000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2814.605501] XFS (loop2): Mounting V4 Filesystem [ 2814.614535] XFS (loop2): totally zeroed log [ 2814.622742] XFS (loop2): Failed to read root inode 0x1804000000000d88, error 22 09:26:16 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x1a', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:16 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDSKBLED(r0, 0x4b65, 0x7ff) socketpair(0x13, 0x3, 0x8, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) connect$llc(r1, &(0x7f0000000180)={0x1a, 0x31f, 0xffffffff, 0xff, 0x5, 0x9, @random="f70cf567977a"}, 0x10) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) r2 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x9, 0x400200) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x2000, 0x0) write$P9_RLERROR(r3, &(0x7f0000000240)={0x18, 0x7, 0x2, {0xf, '/dev/dri/card#\x00'}}, 0x18) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r2, 0xc01064b5, &(0x7f0000000100)={&(0x7f00000000c0)=[0x0, 0x0], 0x2}) 09:26:16 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, &(0x7f0000000040), 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:26:16 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000021806000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2815.007538] XFS (loop0): Mounting V4 Filesystem [ 2815.015297] FAT-fs (loop1): bogus number of reserved sectors [ 2815.021240] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2815.043184] XFS (loop0): totally zeroed log [ 2815.053108] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 09:26:16 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0xfffffff6, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:26:16 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x20000000, 0x0) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) r2 = semget(0x1, 0x3, 0x122) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000000200)=""/217) [ 2815.081735] XFS (loop0): Unmount and run xfs_repair [ 2815.092658] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2815.101279] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2815.119491] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:16 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\"', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2815.134330] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2815.146140] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2815.180754] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2815.216413] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2815.258902] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2815.293437] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:17 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0xfffffffffffffffd, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0xffffffffffff2205, 0x6, 0x7ff, 0x8, 0x13, 0x7, 0x5c1, 0x200, 0x7, 0x81, 0x1000, 0x7}) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000100)={0x3, &(0x7f00000000c0)=[{}, {}, {}]}) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="04031e3d7badf23b4bfd96518a6240cc4f11d4ddc24c2fccb617affe2c7d63af459ef7c896ef994b92ddfb4fd2794b97a5bd0c84d5609c30e4"], 0x10, 0x1) [ 2815.319776] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2815.376918] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2815.406932] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2815.417189] XFS (loop2): Mounting V4 Filesystem 09:26:17 executing program 5: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x14, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0d6300000f630c4000006327e196747500000000"], 0xfc, 0x0, &(0x7f0000000200)="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"}) ioctl$TIOCGETD(r0, 0x5424, &(0x7f00000000c0)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)=0xf) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) [ 2815.452768] XFS (loop2): totally zeroed log [ 2815.470896] XFS (loop2): Failed to read root inode 0x1806000000000d88, error 22 09:26:17 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfsD', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:17 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000040000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:17 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) fsetxattr$security_capability(r0, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v2={0x2000000, [{0x1, 0x8001}, {0x6}]}, 0x14, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) r2 = dup2(r0, r0) ioctl$KVM_S390_VCPU_FAULT(r1, 0x4008ae52, &(0x7f0000000500)=0x6c04) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0xf) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000100)={0x800, 0x5, 0x2, 0x101, 0x5, 0x102, 0x5, 0x4, 0x0}, &(0x7f0000000580)=0x20) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000440)={r4, @in6={{0xa, 0x4e20, 0xffffffffffffff5c, @empty, 0x400}}, 0x2, 0x800, 0x2, 0x3c, 0x40}, 0x98) ioctl$SG_SET_RESERVED_SIZE(r2, 0x2275, &(0x7f0000000540)=0x101) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xa, 0x4, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0x22}, @alu={0x7, 0x400, 0xd, 0x7, 0x7, 0x20}, @jmp={0x5, 0x0, 0xf, 0x1, 0xf, 0x0, 0x10}, @generic={0x1, 0x9, 0x7, 0x2, 0x8}], &(0x7f0000000200)='GPL\x00', 0x4fb, 0x60, &(0x7f0000000280)=""/96, 0x41f00, 0x1, [], r5, 0xf}, 0x48) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000240)=0x200) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000000)) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000400)={0xcb7, 0x48}) ioctl$PPPIOCGUNIT(r2, 0x80047456, &(0x7f00000003c0)) 09:26:17 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, &(0x7f0000000040), 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:26:17 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000021908000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0xfffffffe, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:26:17 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="174035266d5fd50ea52cbe208583ceaa1b836fb23fa64799c9e9f5a6b03ea863717fd8", 0x23, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r1, 0xfffffffffffffffa) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000200)={0xffffffffffffff9c}) getsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f00000003c0)={@ipv4={[], [], @loopback}}, &(0x7f0000000400)=0x14) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f0000000180)={0x0}) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000002c0)={0x2c, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="106340030000000000000010630840010000000000000006630740030000000363084000c2e4a6c2f1ce2e1be62b5b41ed156d45fd9c747fb72e931da40f0a63e7b6ec37a4013a94825e2be0704adcaeff54e6d76263a8650ea93bafb3f41bc45af8cd766610cbd4c4a9daecf35d3b1ce20f89803e1bb1a253c3bc2b", @ANYRES64=r4], 0x49, 0x0, &(0x7f0000000240)="959b6eb77b52ea72e8e7345b8a879ec64aa637087e70e548d9a7bb3adcb6d148c9cfe0507c47e271065db8f0ec166e4c97ba10265f46b6570bdbedbaad61a86e2c117832e05eb83b4b"}) [ 2815.908815] XFS (loop0): Mounting V4 Filesystem [ 2815.915293] XFS (loop0): totally zeroed log [ 2815.920464] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2815.955949] XFS (loop0): Unmount and run xfs_repair [ 2815.969915] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2816.006670] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2816.036448] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:17 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) iopl(0xf6f) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) [ 2816.066704] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2816.075748] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2816.084625] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2816.094473] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2816.106332] FAT-fs (loop1): bogus number of reserved sectors 09:26:17 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfsp', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2816.112172] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2816.118335] XFS (loop2): Mounting V4 Filesystem [ 2816.139911] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2816.148708] XFS (loop2): totally zeroed log [ 2816.174892] XFS (loop2): Failed to read root inode 0x1908000000000d88, error 22 [ 2816.229341] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2816.283909] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 09:26:18 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x8800, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f00000000c0)=0x992, 0x8) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) [ 2816.340442] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2816.394209] XFS (loop0): Failed to read root inode 0xd88, error 117 09:26:18 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000021909000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:18 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfsz', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:18 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) r1 = gettid() ptrace$getregs(0xc, r1, 0x3, &(0x7f0000000080)=""/146) 09:26:18 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000050000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:18 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x1, 0xc0000) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f00000000c0)) [ 2816.804020] XFS (loop0): Mounting V4 Filesystem [ 2816.831373] XFS (loop0): totally zeroed log [ 2816.842059] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2816.856225] XFS (loop2): Mounting V4 Filesystem [ 2816.882491] XFS (loop0): Unmount and run xfs_repair [ 2816.913438] XFS (loop2): totally zeroed log [ 2816.918234] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2816.940090] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:18 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{0x0}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:26:18 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x10000000000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:26:18 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0xf) 09:26:18 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x80', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2816.971654] XFS (loop2): Failed to read root inode 0x1909000000000d88, error 22 [ 2816.979762] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2816.988831] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2817.005284] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2817.026614] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2817.044427] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2817.084950] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2817.115427] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:18 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000080)={0xffffffff, 0x2, 0xaf7, 0x7, 0x1a, 0x20, 0x3, 0x9, 0x8000, 0x516}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) [ 2817.141926] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2817.211005] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 09:26:18 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002190a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:19 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x20000, 0x0) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000000c0)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)) [ 2817.272415] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2817.378299] FAT-fs (loop1): bogus number of reserved sectors [ 2817.384171] FAT-fs (loop1): Can't find a valid FAT filesystem 09:26:19 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000060000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:19 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xac', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:19 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{0x0}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:26:19 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x20000000000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2817.672601] XFS (loop2): Mounting V4 Filesystem [ 2817.696854] XFS (loop2): totally zeroed log 09:26:19 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x4, 0x80) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.threads\x00', 0x2, 0x0) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) [ 2817.728819] XFS (loop2): Failed to read root inode 0x190a000000000d88, error 22 [ 2817.796194] XFS (loop0): Mounting V4 Filesystem [ 2817.836412] FAT-fs (loop1): bogus number of reserved sectors [ 2817.842230] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2817.850665] XFS (loop0): totally zeroed log 09:26:19 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xb4', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:19 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0xfffffffffffffffc, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) ioctl$TIOCGPTPEER(r0, 0x5441, 0x6) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x100000000, 0x400000) write$P9_RREADLINK(r1, &(0x7f00000000c0)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000100)=0x100000000, &(0x7f0000000140)=0x4) [ 2817.878229] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2817.908095] XFS (loop0): Unmount and run xfs_repair [ 2817.917784] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2817.982890] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2818.030797] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2818.049439] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2818.067751] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:19 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000021840000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:19 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000080)={0x6, 0x0, 0x8, 0x100, 0x10000, 0x3}) [ 2818.135723] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:19 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xbc', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2818.208578] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:20 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x40000000000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2818.289934] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2818.329166] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:20 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VIDIOC_ENUMAUDIO(r0, 0xc0345641, &(0x7f0000000080)={0xfffffffffffffffc, "8385d76d41d469d586f6dbd26fa1c1a53684f17b34af603072928b7bf3fced7c", 0x3, 0x1}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) [ 2818.385510] XFS (loop2): Mounting V4 Filesystem [ 2818.407185] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2818.424559] XFS (loop2): totally zeroed log [ 2818.444307] XFS (loop2): Failed to read root inode 0x1840000000000d88, error 22 [ 2818.471652] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2818.520989] XFS (loop0): Failed to read root inode 0xd88, error 117 09:26:20 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000080000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:20 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xd8', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:20 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x7, 0x200800) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000000c0)) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) 09:26:20 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000021940000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:20 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{0x0}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:26:20 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) [ 2818.856499] FAT-fs (loop1): bogus number of reserved sectors [ 2818.862419] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2818.895285] XFS (loop2): Mounting V4 Filesystem [ 2818.936003] XFS (loop2): totally zeroed log [ 2818.965691] XFS (loop2): Failed to read root inode 0x1940000000000d88, error 22 09:26:20 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xdc', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2819.042776] XFS (loop0): Mounting V4 Filesystem [ 2819.062572] XFS (loop0): totally zeroed log 09:26:20 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x7, 0x80000) bind$bt_rfcomm(r1, &(0x7f00000000c0)={0x1f, {0x1, 0x348000, 0x4, 0x1, 0x1, 0x97cb}, 0x7fffffff}, 0xa) [ 2819.093813] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2819.108253] XFS (loop0): Unmount and run xfs_repair [ 2819.118398] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2819.128315] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2819.137674] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2819.146088] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2819.154759] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2819.163450] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2819.172181] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2819.180934] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2819.189619] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2819.198301] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2819.268651] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 09:26:21 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000021846000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2819.336534] XFS (loop0): Failed to read root inode 0xd88, error 117 09:26:21 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x60000000000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:26:21 executing program 5: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000080)={0x6, 0x0, [{0x40000000, 0x8, 0x2, 0x92, 0x80, 0x400, 0x40}, {0x8000000f, 0x7, 0x2, 0xebfe, 0x4, 0x1}, {0x40000000, 0x400, 0x5, 0x5, 0x400, 0x4, 0x7fffffff}, {0xc0000001, 0x1, 0x6, 0x4, 0x1, 0x3, 0xff}, {0x0, 0x5, 0x3, 0x10001, 0x7, 0x8, 0x5}, {0xc000000a, 0xf7, 0x1, 0x400, 0x2, 0xbd19, 0x24d5744b}]}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)) 09:26:21 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xe8', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2819.628117] XFS (loop2): Mounting V4 Filesystem [ 2819.661079] XFS (loop2): totally zeroed log 09:26:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000080)=""/238) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) 09:26:21 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000080080000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:21 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) [ 2819.708276] XFS (loop2): Failed to read root inode 0x1846000000000d88, error 22 09:26:21 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000021847000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x1001, 0x800) recvfrom$inet(r1, &(0x7f00000000c0)=""/156, 0x9c, 0x20, &(0x7f0000000180)={0x2, 0x4e23, @remote}, 0x10) 09:26:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) r1 = dup2(r0, r0) mmap$xdp(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x4, 0xc6012, r1, 0x180000000) [ 2820.034247] XFS (loop0): Mounting V4 Filesystem [ 2820.063851] XFS (loop0): totally zeroed log 09:26:21 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xea', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2820.086224] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2820.119057] XFS (loop0): Unmount and run xfs_repair [ 2820.125196] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2820.165655] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2820.176009] XFS (loop2): Mounting V4 Filesystem [ 2820.193445] XFS (loop2): totally zeroed log [ 2820.201212] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x8000, 0x0) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f00000002c0)=""/213) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x2, 0x0) getsockopt$inet_udp_int(r2, 0x11, 0x0, &(0x7f0000000280), &(0x7f0000000140)=0xffffffffffffff5c) connect$bt_l2cap(r2, &(0x7f00000000c0)={0x1f, 0x8f9, {0x1000, 0x101, 0x101, 0x7, 0xfffffffffffffff7, 0xfff}, 0x8000, 0x1}, 0xe) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000003c0)={{0xd000, 0x16000, 0xe, 0x0, 0xffffffff, 0x8, 0x2, 0x9, 0x101, 0x20, 0x2, 0x9}, {0x100000, 0x2001, 0xb, 0x1, 0x0, 0x3f, 0x5a, 0x1, 0x80000000, 0x8f, 0x18f, 0x7f}, {0xd005, 0x3000, 0xd, 0x9, 0x5, 0x9, 0x21da, 0x101, 0xffff, 0x4, 0x80, 0x280000000000}, {0x2000, 0x3000, 0x3, 0x864e, 0x2, 0xc, 0x4c09, 0x6, 0x2, 0x1, 0x4, 0xce7}, {0x2000, 0x0, 0xf, 0x100000001, 0x7, 0x0, 0x6, 0x7, 0x1, 0x4, 0x6c, 0x1f}, {0x10f004, 0x4000, 0xe, 0x5, 0x0, 0x3, 0x2, 0x40, 0xa6, 0x2, 0x3, 0x6f2a}, {0x17000, 0x6000, 0x1f, 0x81, 0x5, 0x8, 0x9, 0x9aec, 0x8000, 0x0, 0x8, 0x6}, {0x4, 0x10f000, 0x4, 0x7ff, 0x4, 0x7, 0x3, 0x1, 0x67, 0x1, 0x4, 0x5}, {0x3000, 0x107000}, {0x10001, 0x100000}, 0x40000000, 0x0, 0x2000, 0x20000, 0x9, 0x0, 0x5, [0x1ff, 0x3, 0x6, 0x7fff]}) ioctl$EVIOCGPHYS(r2, 0x80404507, &(0x7f0000000200)=""/69) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180)=0x101, 0x4) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) [ 2820.220078] FAT-fs (loop1): bogus number of reserved sectors [ 2820.225950] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2820.226067] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2820.255277] XFS (loop2): Failed to read root inode 0x1847000000000d88, error 22 [ 2820.301705] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2820.356681] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2820.392165] Unknown ioctl -2146941693 [ 2820.404344] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2820.412814] Unknown ioctl -2146941693 [ 2820.424963] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:22 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000021848000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2820.473593] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2820.496661] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2820.533837] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2820.587922] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2820.782394] XFS (loop2): Mounting V4 Filesystem [ 2820.827110] XFS (loop2): totally zeroed log 09:26:22 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x6b6b6b00000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:26:22 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x3) ioctl$KDSKBLED(r0, 0x4b65, 0x100) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xf) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x7, 0x40003) getsockname$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) r4 = openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe2(&(0x7f00000002c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x2, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000280)={0x4, 0x8, 0xfa00, {r5}}, 0x10) bind$packet(r2, &(0x7f0000000140)={0x11, 0x17, r3, 0x1, 0x31ad833e, 0x6, @local}, 0x14) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)) 09:26:22 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xec', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:22 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a0000000100001000000000010000010a0000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2820.849592] XFS (loop2): Failed to read root inode 0x1848000000000d88, error 22 09:26:22 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:26:22 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x100000, 0x0) write$smack_current(r1, &(0x7f00000000c0)='/dev/ptmx\x00', 0xa) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xc) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) 09:26:22 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000021964000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2821.074939] XFS (loop0): Mounting V4 Filesystem 09:26:22 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xee', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2821.106402] XFS (loop0): totally zeroed log [ 2821.152438] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2821.202689] XFS (loop0): Unmount and run xfs_repair [ 2821.240333] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2821.268751] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2821.286435] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:23 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0xfffffffffffffffc, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x101000, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000100)=0x5, 0x4) [ 2821.314247] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2821.329688] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2821.343175] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2821.352724] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2821.363893] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:23 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={0xffffffffffffff9c}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f00000000c0)={0x0, 0xac, "2d2cabdeb901069be5e0a6e43a7c28aa9a1d7c63c6060763585b23fec2542b51001a797695677306795d55f0bf56c1a3d0c52f4ea40b052cf91363df9718cba24c4b8deb9e8f583a69d70ee720e4068ff4e745cb134024b9cf391514d142c8bb0f71526ad779ec6f1caa70cf5d789280910044b7b76ce3756d9a334388e1d8435db0e68ce5f698e58d3d596f528c9ac93424137965677a59538bab0e3815156beb18dc85d89766767101e331"}, &(0x7f0000000180)=0xb4) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000200)={r2, 0x200}, 0x8) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) [ 2821.474139] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2821.498961] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 09:26:23 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xf4', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2821.520835] FAT-fs (loop1): bogus number of reserved sectors [ 2821.526808] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2821.563421] XFS (loop2): Mounting V4 Filesystem [ 2821.646101] XFS (loop2): totally zeroed log [ 2821.656510] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2821.666771] XFS (loop2): Failed to read root inode 0x1964000000000d88, error 22 [ 2821.674720] XFS (loop0): Failed to read root inode 0xd88, error 117 09:26:23 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) 09:26:24 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x80ffff00000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:26:24 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000100000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:24 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000080)=0x4d) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x10) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000000c0)={0x1f, 0x9, 0x100000000000, 0x200, 0x18, 0xed, 0x7fff, 0x71, 0xfff, 0x7, 0xfffffffffffffff9, 0x4}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)) 09:26:24 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000021965000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:24 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xf9', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:24 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:26:24 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) ftruncate(r0, 0x402) ioctl$TIOCNOTTY(r0, 0x5422) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f0000000080)={0x80000000, 0x2, 0x6, 0x4, 0x1000}) [ 2822.492953] XFS (loop2): Mounting V4 Filesystem [ 2822.514853] XFS (loop2): totally zeroed log [ 2822.537126] XFS (loop2): Failed to read root inode 0x1965000000000d88, error 22 [ 2822.567247] XFS (loop0): Mounting V4 Filesystem 09:26:24 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xfc', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2822.590520] XFS (loop0): totally zeroed log [ 2822.596086] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2822.625036] XFS (loop0): Unmount and run xfs_repair 09:26:24 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) pwrite64(r0, &(0x7f0000000200)="ea423f21634bb13df778c61fcf317cfbccd457e9d5dc8feb318cd142f4cf97ac806dd1ee5d7f71763f1d148bf79aacd51e718afd9c9c9e4e6b8d1aed060b6724d953fd59d3bc5826edcd9c227ce8f0c9197fc22e251d51a8d5296235de582ddeac513f63067ad995d3e8513ba35f8b11cc57137686bab5cf8a552e54d6aabce3319cb0f593cb5dcea34602342c73f89d110b9819806e572ee9abbcd2fd8796eb766678", 0xa3, 0x0) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000100)=0x80) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000780), 0x4) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000280)={"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"}) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000680)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xff02}}) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000040)=0xf) syz_init_net_socket$rose(0xb, 0x5, 0x0) getrusage(0x1, &(0x7f0000000380)) ioctl$TCSETSF(r5, 0x5412, &(0x7f0000000000)) r6 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x480002, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r6, 0x8250aea6, &(0x7f0000000440)=""/150) accept(r1, &(0x7f00000007c0)=@alg, &(0x7f0000000840)=0x80) [ 2822.652846] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2822.697033] FAT-fs (loop1): bogus number of reserved sectors [ 2822.702931] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2822.710918] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:24 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000021966000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2822.779270] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2822.793825] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2822.802381] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2822.847698] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2822.905974] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2822.922714] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2822.953125] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2822.976520] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2823.013279] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2823.034228] XFS (loop0): Failed to read root inode 0xd88, error 117 09:26:24 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:24 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0xc0ffff00000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:26:24 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x30) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) ioctl$int_out(r0, 0x5462, &(0x7f00000000c0)) [ 2823.321278] XFS (loop2): Mounting V4 Filesystem 09:26:25 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a0000000100001000000000010000011c0000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2823.364875] XFS (loop2): totally zeroed log [ 2823.375090] XFS (loop4): Mounting V4 Filesystem [ 2823.385590] XFS (loop2): Failed to read root inode 0x1966000000000d88, error 22 [ 2823.422090] XFS (loop4): totally zeroed log [ 2823.434773] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 09:26:25 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x8000, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40800, 0x4) ioctl$KDSKBLED(r0, 0x4b65, 0x3) r2 = geteuid() ioctl$TUNSETOWNER(r1, 0x400454cc, r2) pipe(&(0x7f0000000180)={0xffffffffffffffff}) ioctl$EVIOCGMTSLOTS(r3, 0x8040450a, &(0x7f0000000140)=""/8) r4 = semget$private(0x0, 0x2, 0xe0) semctl$SEM_INFO(r4, 0x2, 0x13, &(0x7f0000000200)=""/155) ioctl$sock_bt_hidp_HIDPCONNDEL(r3, 0x400448c9, &(0x7f00000000c0)={{0x9, 0x8, 0x8a5f, 0x0, 0x7f, 0x1}, 0x6}) gettid() 09:26:25 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174", 0xb}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:26:25 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2823.758720] FAT-fs (loop1): bogus number of reserved sectors [ 2823.764669] FAT-fs (loop1): Can't find a valid FAT filesystem 09:26:25 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002196e000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2823.806391] XFS (loop0): Mounting V4 Filesystem 09:26:25 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0xf0ffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:26:25 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x1f, 0x0, 0x0, 0x0, 0xf}) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000180)=0x8) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) sendto$llc(r2, &(0x7f0000000200)="eef31bacdd7e2b28a66a4e3b5cbbe25912e67e303a1ce962425344c421f1027548b6c541ad4b8b5e9f6cb8a830841260d60bab90279440392780e30d43f511c53e41108ffa37f8a5d4f2a135900add333120b0c8b1a8124ef56a330bcbb9d9cc184f81914e8d8e9f5d5a11373d032fdf5078aaf510a9d6efec2766946680edb2e1057659cc6ac2e0ddc9ead2912808fe10dee0de0560efbb7cbc7b276792c19ec583d6b1f452ff49c54e04ff", 0xac, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x6, 0x8001, 0x0, 0x8}) [ 2823.828102] XFS (loop0): totally zeroed log [ 2823.842352] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2823.852348] XFS (loop0): Unmount and run xfs_repair [ 2823.863120] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2823.870117] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2823.883921] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2823.892380] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2823.914569] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2823.933919] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2823.990479] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2824.030305] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2824.056620] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2824.147582] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2824.172460] XFS (loop4): Mounting V4 Filesystem [ 2824.173378] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2824.187436] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2824.197008] XFS (loop4): totally zeroed log [ 2824.208163] XFS (loop2): Mounting V4 Filesystem [ 2824.233905] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2824.242105] XFS (loop2): totally zeroed log 09:26:25 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x100, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) ioctl$SIOCNRDECOBS(r1, 0x89e2) [ 2824.257159] XFS (loop2): Failed to read root inode 0x196e000000000d88, error 22 09:26:26 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a0000000100001000000000010000003f0000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:26 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000021970000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:26 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x4, 0x404002) readlinkat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=""/170, 0xaa) 09:26:26 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174", 0xb}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:26:26 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:26 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000080)) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) [ 2824.755561] XFS (loop0): Mounting V4 Filesystem [ 2824.774692] XFS (loop2): Mounting V4 Filesystem [ 2824.780489] XFS (loop0): totally zeroed log [ 2824.787331] XFS (loop2): totally zeroed log [ 2824.798756] XFS (loop2): Failed to read root inode 0x1970000000000d88, error 22 [ 2824.825367] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2824.877422] XFS (loop0): Unmount and run xfs_repair [ 2824.894557] XFS (loop4): Mounting V4 Filesystem [ 2824.914329] XFS (loop4): totally zeroed log [ 2824.923425] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2824.931213] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2824.956673] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:26 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x100000000000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2824.993001] FAT-fs (loop1): bogus number of reserved sectors [ 2824.998978] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2825.015151] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:26 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) r1 = add_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r2 = request_key(&(0x7f0000001500)='pkcs7_test\x00', &(0x7f0000001540)={'syz', 0x1}, &(0x7f0000001580)='eth1\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, r1, &(0x7f0000001480)=[{&(0x7f0000000100)="4f123f489a693eb343dee355190fc8f1e1546745a849fd72d3df1d94b83dd007484973167c1cde57e9d89dbc12cc91614f220acd2381c1f56c35d3e847da0a82eecd14eae462c1d862a963b4adaa8cbaa6b221c332a2440efb7aaf7813482ac0c316a10470162c51551572df4063fd5cde7357b36f12f17c98e62f11c684f0", 0x7f}, {&(0x7f0000000200)="02c09ddc772e37237b34e16bebdeeb79b01c10f70fc518c4d5512f6d8654daf86bb1f037f265ce867ad2bdd1b862284764ae66d3f32a6f3602bd8adec7e73030e5c1dc0c64e925aed9ded3dafa434ceb287af59cf134d42d5e8aa39e2aff13b2ea7e91a07c4c4f60cdb99a0048878b21e8c4b22acc5290edeb48029e3a2ec5ab7e9d4a1de0287aa292447db6b67eb83ae5251a240c0ae45a995be26ad49b8f73dcb4a2f14456c86dd5d59eb8e07f7b069a44413d47f38e96c790d7beaa0f8d77c9751c5ede7dd7c648ba667714266b510f672fa984b3dbd8f21a7aee57d74605528d7cdad2c921", 0xe7}, {&(0x7f0000000300)="23a46fbf01fd3e21e77e5921621a54b4efd05d355483474a55a5a2fc5acb1750c28e3599e822dc6df3a9a83008043bcab573ba786d8bd70a2d483512f4f7154efc257d302bc9e59318859e725281688048179d232509242d9839641b336d46e09d69e428d6ebaca23c0474f7abc3745cb585ce4c4395b1777ff47212d121b3f6a487fd7f66b00fae8da99323da6c038886432ac2e99e41cae41fd8e5886f18e6c75ac2230df04224a4412d2803252daebd6d3174e86837ee0b296c", 0xbb}, {&(0x7f00000003c0)="8938e482a3829a6fee8f82ae90722f941841be556e5b2e5f626ae44a1890b08f9b9806dde6bc681992af5e75a9760cac33461fb9f76438aa9aaad06d5dc791be2d0b2942e0392bae4afbd6794ca5a93ef00af8f3abb8087414ba3dc5d643f9ffd666808132ac585f516acc169a0f322eb45f2acc102466fc0dc1d0b5820ad96bb8e875422e602b8e4e09ac", 0x8b}, {&(0x7f0000000180)="8da470299627e54147ccce56a944d7f388c460a9e446737b967dbc94408ab5fc01637f0d658e3fb80fd9ac4a7eb332ab", 0x30}, {&(0x7f0000000480)="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", 0x1000}], 0x6, r2) [ 2825.041938] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2825.055763] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2825.068652] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2825.091549] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2825.099970] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:26 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2825.146663] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:26 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000021971000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2825.187148] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2825.196723] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2825.216489] XFS (loop0): Failed to read root inode 0xd88, error 117 09:26:27 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x200000000, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) 09:26:27 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001006b6b6b0000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2825.489724] XFS (loop4): Mounting V4 Filesystem [ 2825.512184] XFS (loop4): totally zeroed log [ 2825.534112] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 09:26:27 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x6) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) [ 2825.665086] XFS (loop2): Mounting V4 Filesystem [ 2825.697529] XFS (loop2): totally zeroed log 09:26:27 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2825.719640] XFS (loop2): Failed to read root inode 0x1971000000000d88, error 22 [ 2825.780197] XFS (loop0): Mounting V4 Filesystem 09:26:27 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174", 0xb}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) [ 2825.821792] XFS (loop0): totally zeroed log [ 2825.831573] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2825.870742] XFS (loop0): Unmount and run xfs_repair 09:26:27 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000240)={0x5, 0x2f8380, 0x101, 0x1, 0x9}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x8000, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=r2, @ANYBLOB="000227bd7000ffdbdf25110000090000000c00010008000b00736970000800040006000000080005008000000020000200080003000300000014000100ac1414aa00000000000000000000000008000500010000000400010028000300080007004e22000008000400000800f913000600ff02000000000000000000000000000125f338390cf5a986c1ae61303c0ea59d2ee3f6b5b6f541f8de4a9ba9199b08000000000000009d2cc25ac3d05729f66999cfbb506f1557a704375bf43c81d409475d2c1fe71683af506253f6d68b00047c7fcf06e8d7a91bbe71b2abe3b898bdaf91b0eafdcdafa778871c89a7c9df8116e79e8385549e6d2c9256615e7b4e81a3613c92c1cd84607d692fffd023ebfc3d46f495e9ab010ed9014f98fcd2e1e77f03000000000000002b0e7e4f706c2f9876ba3c5ec197fd88656a503e4e0feeff11de8fa973"], 0x8c}, 0x1, 0x0, 0x0, 0x40000}, 0x84) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000140)=0x3f) r3 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r0, &(0x7f00000000c0)={0x4}) 09:26:27 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000021880000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2825.918926] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2825.956698] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2825.992725] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2826.051328] XFS (loop4): Mounting V4 Filesystem 09:26:27 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) [ 2826.076791] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2826.095741] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2826.106064] XFS (loop4): totally zeroed log [ 2826.111163] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2826.141803] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2826.168003] XFS (loop2): Mounting V4 Filesystem [ 2826.204958] XFS (loop2): totally zeroed log [ 2826.210339] XFS (loop2): Failed to read root inode 0x1880000000000d88, error 22 [ 2826.223869] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2826.241617] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2826.258622] FAT-fs (loop1): bogus number of reserved sectors [ 2826.264438] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2826.314768] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2826.360733] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 09:26:28 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x200000000000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:26:28 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f00000000c0)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x0, 0x4000000000, 0x66ca, 0x0, 0x4, 0x8, 0x0, 0x400000000000000, 0x0, 0x0, 0x2, 0xfffffffffffffffd}) ioctl$TIOCNXCL(r1, 0x540d) 09:26:28 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2826.443503] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 09:26:28 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:28 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x7, 0x2a0081) ioctl$KDDISABIO(r0, 0x4b37) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x2, 0x14102) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)) [ 2826.499470] XFS (loop0): Failed to read root inode 0xd88, error 117 09:26:28 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000004800000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2826.797891] XFS (loop4): Mounting V4 Filesystem [ 2826.822490] XFS (loop4): totally zeroed log 09:26:28 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0xc0000, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) [ 2826.857206] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2826.933366] XFS (loop2): Mounting V4 Filesystem [ 2826.950328] XFS (loop2): totally zeroed log [ 2826.967362] XFS (loop2): Failed to read root inode 0x189a000000000d88, error 22 09:26:28 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002", 0x11}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) [ 2827.037728] XFS (loop0): Mounting V4 Filesystem [ 2827.054115] XFS (loop0): totally zeroed log 09:26:28 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x200000, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) [ 2827.087428] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2827.121760] XFS (loop0): Unmount and run xfs_repair 09:26:28 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2827.142325] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2827.173804] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:28 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189b000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2827.196771] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:29 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x8, 0x8a040) r1 = add_key(&(0x7f0000000100)='.dead\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$get_security(0x11, r1, &(0x7f0000000200)=""/215, 0xd7) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f00000000c0)={0x3, 0x1a135ccc}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x8020000, 0x0) ioctl$TIOCNXCL(r0, 0x540d) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000000)={0x0, 0x40, 0x0, 0x0, 0x0, 0x6bee}) [ 2827.247299] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2827.282335] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2827.324472] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2827.350961] FAT-fs (loop1): invalid media value (0x00) [ 2827.356365] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2827.372030] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2827.394224] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2827.416060] XFS (loop4): Mounting V4 Filesystem [ 2827.430973] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2827.441924] XFS (loop2): Mounting V4 Filesystem [ 2827.459289] XFS (loop4): totally zeroed log [ 2827.463323] XFS (loop2): totally zeroed log [ 2827.474402] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2827.489592] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2827.500971] XFS (loop2): Failed to read root inode 0x189b000000000d88, error 22 [ 2827.545566] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2827.583875] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2827.679005] XFS (loop4): Mounting V4 Filesystem 09:26:29 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x300000000000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:26:29 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) 09:26:29 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001fffffff60000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2827.720144] XFS (loop4): AIL initialisation failed: error -12 [ 2827.752834] XFS (loop4): log mount failed 09:26:29 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189c000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:29 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x88', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:29 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)) prctl$PR_GET_SECUREBITS(0x1b) 09:26:29 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2828.091604] XFS (loop0): Mounting V4 Filesystem [ 2828.146867] XFS (loop0): totally zeroed log 09:26:29 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002", 0x11}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:26:29 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2000, 0x0) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f00000000c0)={0x7, 0x5}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) getresuid(&(0x7f0000000300)=0x0, &(0x7f0000000340), &(0x7f0000000380)) getgroups(0x4, &(0x7f00000003c0)=[0xee00, 0xee01, 0xee01, 0xee01]) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000001940)={0x0, 0x8}, &(0x7f0000001980)=0x8) sendmsg$inet_sctp(r0, &(0x7f0000001ac0)={&(0x7f00000014c0)=@in={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000018c0)=[{&(0x7f0000001500)="77ebbb95bb95b48bd71c53c396cc958ffe0788d5aa0b32f9464117d82d4d1e70e6d4fee3acc266f16a9bac99a299a0cea01b68ffda6671f87d97aaa3beb051d5826f1ecd77bdc6116a7e4d6ee132dd593d89f30e9b73887a5ac8c4bed4c6e8e72cc3bf018703a2ab84755aede9609e2904da2ec751893ed6e087fe1cf2ada00b29e01c28ac3a90d9f698a5f72f040213febe54cfabf26cae802f5d5282b1b3b7cc75f16d71e23ebe1e44ad4f656de326797a976b6f00ad582fb6768136fba5795e79ea20d228a86d2817fc28ad5c0530695663af950cc256cc80cde0473056c0f335ff576e2a02bbeedd4b", 0xeb}, {&(0x7f0000001600)="c2455e0eb4c5b7e17241a7d23437648f9ca0c39555a774c683ccc2c95bfcd3fdad49f7f483e01d5b13d7bda1189685e26da78213a9582d16df0dacc58899897ab9b9b1ea551cc9c258a7c6310d051c56adaeba8bd6534432ad405ea71fd4f72040082e84450d2fdf0283ccaf69cf0887352d811a94c4c51589ec9c21d94b862cd7359214", 0x84}, {&(0x7f00000016c0)="5b7b47702e0ee87209274a8914a03359ad1928dc7dc001aef8aad57b117d", 0x1e}, {&(0x7f0000001700)="276531c70555002b91f3", 0xa}, {&(0x7f0000001740)="2a2c72ebb782e8da3e55cca2c64ab1dd71019e837cdb5e566d30e6c34eb8b385e576e3d48b343c10475eee344c86f4c967138eea1863302a6b980a98f08ee6c0705e5254a9ce3633c36570a0a836fb946d7a70a9aa6c1ef84d05d973d58d3755846e78794de66efb5374099f4f78df52ff0be32aa1ec9acd3b5868d6ee98732ddeae053c881d4dbfb7fa791657ad009932be37d1575948f6308a827747aa9eca3d5b348a039e7c0c5abddb39fa72627ea0abc5aa97ce2c179139560bb7f3e91a00a2e36adaa01f73ff9b9e1734340af03ecff80ed02eb3fa0698a49cbe0a91f87956844ce6e21cc8b18112d8c765", 0xee}, {&(0x7f0000001840)="9acaa697c087207eb100ce2c4499def5ed731b92e47f36e688de85cf7d2d1b899db5ed457f46a7af043db4ce890ab36574a34a07f2354c40cdce10c729e77ad76fb5bab513325803f5fffa5e2da31d76a1a468e1b1092859709b1d96afe2b66c63ca01d4d92b88b57519286c1e27690550b82ec7ee1a6e5ebae800", 0x7b}], 0x6, &(0x7f00000019c0)=[@init={0x18, 0x84, 0x0, {0x101, 0x2, 0x0, 0x2}}, @authinfo={0x18, 0x84, 0x6, {0xffffffff}}, @dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, [], 0x1f}}, @dstaddrv4={0x18, 0x84, 0x7, @rand_addr=0xb5}, @dstaddrv6={0x20, 0x84, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @dstaddrv4={0x18, 0x84, 0x7, @local}, @init={0x18, 0x84, 0x0, {0x1ff, 0xfffffffffffffff8, 0x1000, 0xff}}, @sndinfo={0x20, 0x84, 0x2, {0x465, 0x2, 0x9, 0x6, r6}}], 0xd8, 0x40}, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000400)={{{@in=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000600)={{{@in=@empty, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000700)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000740)={0x0, 0x0, 0x0}, &(0x7f0000000780)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000007c0)={{{@in6=@ipv4={[], [], @loopback}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000900)={0x0, 0x0, 0x0}, &(0x7f0000000940)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, &(0x7f0000000a80)=0xe8) r14 = getegid() getresuid(&(0x7f0000000ac0)=0x0, &(0x7f0000000b00), &(0x7f0000000b40)) getgroups(0x1, &(0x7f0000000b80)=[0xee01]) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000bc0)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000cc0)=0xe8) fstat(r0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000d80)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000000e80)=0xe8) r20 = getegid() write$FUSE_DIRENTPLUS(r0, &(0x7f0000000ec0)={0x5d8, 0x0, 0x4, [{{0x4, 0x1, 0x80000000, 0x5, 0x3f, 0xdad, {0x0, 0x0, 0x5, 0x3, 0x4, 0x3, 0x1, 0x0, 0x6bc, 0x7d, 0x1f, r2, r3, 0x0, 0x7}}, {0x3, 0x13, 0x4, 0x6c, 'eth0'}}, {{0x6, 0x1, 0xfffffffffa04dcdf, 0x8, 0xfffffffffffffffe, 0x7, {0x0, 0xb, 0x101, 0x2, 0x1, 0x8, 0xfffffffffffffffe, 0xfffffffffffffda3, 0xff, 0x0, 0x1, r4, r5, 0x3, 0xffffffffffffffe1}}, {0x6, 0xfffffffffffffff7, 0xa, 0x4, '/dev/ptmx\x00'}}, {{0x3, 0x0, 0x8, 0x3, 0x5, 0x4, {0x0, 0x1, 0x6, 0x9, 0xffffffffffffffff, 0xffffffffffff7fff, 0x0, 0x3ff, 0x4, 0x3, 0x5, r7, r8, 0xfffffffffffffffd, 0x7fffffff}}, {0x5, 0x3, 0x0, 0x200}}, {{0x6, 0x2, 0x80000000, 0x4, 0xb6, 0x7ff, {0x0, 0x3, 0x1, 0x4, 0x8, 0x80000000000, 0x8, 0x8, 0x6, 0x5, 0x100000000, r9, r10, 0x9, 0x80}}, {0x4, 0x7, 0xa, 0x1f, '/dev/ptmx\x00'}}, {{0x2, 0x3, 0x400000000, 0x5, 0x6, 0x9, {0x1, 0x1, 0x7, 0x6, 0x4, 0x515394ec, 0x4, 0x8, 0x4, 0x3, 0xffffffffffffffff, r11, r12, 0x55c000000000, 0x261d}}, {0x4, 0x7f, 0xa, 0x5, '/dev/ptmx\x00'}}, {{0x4, 0x0, 0xa9c6, 0xffffffff, 0x8, 0x5, {0x3, 0xfffffffffffffffe, 0x1, 0x0, 0x80000001, 0x8, 0x64, 0xffffffff, 0x2, 0x7f, 0x8, r13, r14, 0xea6}}, {0x6, 0x9, 0xd, 0x80, 'eth0-vboxnet0'}}, {{0x2, 0x3, 0xfff, 0x8001, 0x7, 0x6, {0x5, 0x8, 0x4, 0xb9, 0x8001, 0x8, 0xfffffffffffffff9, 0xfffffffeffffffff, 0x1, 0x7, 0x0, r15, r16, 0x81, 0x80}}, {0x2, 0x3, 0xa, 0x200, '/dev/ptmx\x00'}}, {{0x0, 0x1, 0x9, 0x20, 0x7, 0x3ff, {0x1, 0x9, 0x20, 0x0, 0x4, 0x1000, 0x3f, 0x7ff, 0x0, 0xb1, 0x2, r17, r18, 0x1000, 0x40}}, {0x0, 0x400, 0x6, 0xff, '\\ppp0\\'}}, {{0x1, 0x1, 0x7, 0x101, 0x8, 0xaab4, {0x3, 0x101, 0xe67, 0x6, 0x2, 0xaa, 0x60d518d4, 0x7, 0x100000000, 0x3, 0x101, r19, r20, 0x800, 0x200}}, {0x4, 0x7fff, 0xa, 0x5, '/dev/ptmx\x00'}}]}, 0x5d8) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)) [ 2828.176636] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2828.204492] XFS (loop2): Mounting V4 Filesystem [ 2828.221124] XFS (loop2): totally zeroed log [ 2828.233797] XFS (loop2): Failed to read root inode 0x189c000000000d88, error 22 [ 2828.246622] XFS (loop0): Unmount and run xfs_repair [ 2828.275985] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2828.287618] XFS (loop4): Mounting V4 Filesystem [ 2828.295541] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2828.311416] XFS (loop4): totally zeroed log 09:26:30 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x80801, 0x3) shutdown(r0, 0x7fffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 2828.321168] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2828.341063] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2828.352236] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2828.393460] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2828.409130] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2828.419012] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2828.448172] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2828.466413] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2828.510616] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2828.524348] FAT-fs (loop1): invalid media value (0x00) [ 2828.529806] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2828.542374] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 09:26:30 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c19000000000000000218c0000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2828.568786] XFS (loop0): Failed to read root inode 0xd88, error 117 09:26:30 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x03', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2828.784755] XFS (loop2): Mounting V4 Filesystem [ 2828.816789] XFS (loop2): totally zeroed log [ 2828.831178] XFS (loop2): Failed to read root inode 0x18c0000000000d88, error 22 09:26:31 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x400000000000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:26:31 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001fffffdfc0000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:31 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs ', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:31 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000030000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:31 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x80801, 0x3) shutdown(r0, 0x7fffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:26:31 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002", 0x11}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) [ 2829.507322] XFS (loop2): Mounting V4 Filesystem [ 2829.541098] XFS (loop2): totally zeroed log [ 2829.563299] XFS (loop0): Mounting V4 Filesystem [ 2829.568678] XFS (loop2): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2829.587877] XFS (loop2): Unmount and run xfs_repair [ 2829.593036] XFS (loop0): totally zeroed log [ 2829.601620] XFS (loop2): First 128 bytes of corrupted metadata buffer: 09:26:31 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x02', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2829.608941] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2829.610981] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2829.633262] XFS (loop0): Unmount and run xfs_repair [ 2829.652650] FAT-fs (loop1): invalid media value (0x00) [ 2829.658109] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2829.680368] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2829.680604] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2829.711192] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2829.729338] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2829.757405] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2829.758228] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2829.778363] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2829.797751] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2829.815410] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2829.817893] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2829.842252] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2829.854099] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2829.870415] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2829.876225] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2829.891585] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2829.906235] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2829.913660] XFS (loop2): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2829.928146] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2829.956434] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2829.965065] XFS (loop2): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2829.995128] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2830.043501] XFS (loop2): Failed to read root inode 0xd88, error 117 09:26:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400218) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000000040)="da", 0x1}], 0x1) 09:26:31 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x02', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:31 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001fffffffe0000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:32 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000050000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setitimer(0x2, &(0x7f0000000040)={{}, {0x77359400}}, 0x0) 09:26:32 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x500000000000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:26:32 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x01', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:32 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270", 0x14}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) [ 2830.541610] XFS (loop0): Mounting V4 Filesystem [ 2830.555301] XFS (loop0): totally zeroed log [ 2830.573578] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 09:26:32 executing program 5: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = creat(&(0x7f00000000c0)='./file0/file0\x00', 0x0) write$P9_RVERSION(r0, &(0x7f0000000000)={0x13, 0x65, 0xffff, 0x0, 0x6, '9P2000'}, 0x13) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) truncate(&(0x7f0000000040)='./file0/file0\x00', 0x13) [ 2830.598615] XFS (loop2): Mounting V4 Filesystem [ 2830.613169] XFS (loop0): Unmount and run xfs_repair [ 2830.619712] XFS (loop2): totally zeroed log [ 2830.625160] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2830.632409] XFS (loop2): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2830.639169] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2830.650750] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2830.659489] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2830.667868] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2830.673030] XFS (loop2): Unmount and run xfs_repair [ 2830.676620] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2830.736918] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2830.802909] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2830.811664] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2830.820092] FAT-fs (loop1): invalid media value (0x00) [ 2830.825433] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2830.827349] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2830.840034] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2830.855799] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2830.863346] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2830.871762] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2830.882248] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2830.891931] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2830.900224] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2830.909681] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:32 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0) [ 2830.957675] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2830.975204] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2830.984835] XFS (loop0): Failed to read root inode 0xd88, error 117 09:26:32 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x03', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2830.999559] XFS (loop2): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2831.013903] XFS (loop2): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2831.023083] XFS (loop2): Failed to read root inode 0xd88, error 117 09:26:32 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001fcfdffff0000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:33 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c19000000000000000a0000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:33 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0) 09:26:33 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x600000000000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:26:33 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xd0', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:33 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0) 09:26:33 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270", 0x14}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) [ 2831.744945] XFS (loop0): Mounting V4 Filesystem [ 2831.781435] XFS (loop0): totally zeroed log [ 2831.814520] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2831.852424] XFS (loop0): Unmount and run xfs_repair [ 2831.876647] XFS (loop2): Mounting V4 Filesystem 09:26:33 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x700000000000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:26:33 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2831.900253] XFS (loop2): totally zeroed log [ 2831.904658] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2831.917385] XFS (loop2): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2831.934490] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2831.952437] XFS (loop2): Unmount and run xfs_repair [ 2831.957727] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2831.962425] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2831.981997] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:33 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0) [ 2831.998070] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2832.031832] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2832.062013] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2832.070510] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2832.127515] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2832.130568] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2832.176921] XFS (loop4): Mounting V4 Filesystem [ 2832.178783] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2832.183024] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2832.207612] FAT-fs (loop1): invalid media value (0x00) [ 2832.212950] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2832.236890] XFS (loop4): totally zeroed log [ 2832.238877] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2832.275711] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2832.306399] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2832.327691] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2832.333281] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2832.347841] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 09:26:34 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0) [ 2832.356589] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2832.372376] XFS (loop0): Failed to read root inode 0xd88, error 117 09:26:34 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001f6ffffff0000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2832.415374] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2832.466668] XFS (loop2): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2832.517045] XFS (loop2): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2832.525580] XFS (loop2): Failed to read root inode 0xd88, error 117 09:26:34 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0) [ 2832.668018] XFS (loop0): Mounting V4 Filesystem [ 2832.690909] XFS (loop0): totally zeroed log [ 2832.718661] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2832.747210] XFS (loop0): Unmount and run xfs_repair [ 2832.761691] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2832.804011] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:34 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000140000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:34 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x10', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:34 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0) [ 2832.877104] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2832.904037] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2832.955545] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2832.986021] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:34 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270", 0x14}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:26:34 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0) [ 2833.016630] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2833.061838] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2833.102318] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2833.116708] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 09:26:34 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0) [ 2833.143622] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2833.172801] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2833.193201] XFS (loop2): Mounting V4 Filesystem 09:26:34 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x03', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:34 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0xf00000000000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2833.251556] XFS (loop2): totally zeroed log [ 2833.269944] XFS (loop2): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2833.303568] XFS (loop2): Unmount and run xfs_repair [ 2833.316303] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2833.323013] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2833.323024] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2833.323034] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:35 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0) [ 2833.323045] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2833.365602] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2833.388742] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2833.397084] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2833.405226] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2833.413905] XFS (loop2): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2833.432625] FAT-fs (loop1): invalid media value (0x00) [ 2833.437972] FAT-fs (loop1): Can't find a valid FAT filesystem 09:26:35 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001feffffff0000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2833.476495] XFS (loop2): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 09:26:35 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7", 0x15}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:26:35 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0) [ 2833.525989] XFS (loop2): Failed to read root inode 0xd88, error 117 [ 2833.679397] FAT-fs (loop1): invalid media value (0x00) [ 2833.684770] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2833.836712] XFS (loop0): Mounting V4 Filesystem 09:26:35 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000440300000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:35 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0) 09:26:35 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2833.906062] XFS (loop0): totally zeroed log [ 2833.927935] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 09:26:35 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0) [ 2833.985425] XFS (loop0): Unmount and run xfs_repair [ 2834.021129] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2834.054644] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2834.076169] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2834.111558] XFS (loop4): Mounting V4 Filesystem [ 2834.127632] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2834.146623] XFS (loop4): totally zeroed log [ 2834.163018] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2834.171434] XFS (loop2): Mounting V4 Filesystem 09:26:35 executing program 5: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0) [ 2834.192433] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2834.222128] XFS (loop2): totally zeroed log [ 2834.241140] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2834.256743] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2834.257471] XFS (loop2): Failed to read root inode 0x300000000000d88, error 22 [ 2834.303583] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2834.326474] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:36 executing program 5: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0) 09:26:36 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2834.418669] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2834.488039] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2834.570887] XFS (loop0): Failed to read root inode 0xd88, error 117 09:26:36 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x1300000000000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:26:36 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000000600000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:36 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000200000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:36 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7", 0x15}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:26:36 executing program 5: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0) 09:26:36 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0) [ 2834.841885] XFS (loop4): Mounting V4 Filesystem [ 2834.854659] XFS (loop4): totally zeroed log [ 2834.879492] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2834.954175] FAT-fs (loop1): invalid media value (0x00) [ 2834.960007] FAT-fs (loop1): Can't find a valid FAT filesystem 09:26:36 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0) [ 2835.149416] XFS (loop2): filesystem is marked as having an external log; specify logdev on the mount command line. [ 2835.225155] XFS (loop2): SB validate failed with error -22. 09:26:37 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x01', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:37 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x2000000000000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2835.284109] XFS (loop0): Mounting V4 Filesystem 09:26:37 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0) [ 2835.319332] XFS (loop0): totally zeroed log [ 2835.341368] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2835.387161] XFS (loop0): Unmount and run xfs_repair [ 2835.416510] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2835.431538] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2835.449908] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2835.467608] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2835.575606] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:37 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000010900000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2835.666400] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:37 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0) [ 2835.747280] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2835.797847] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:37 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7", 0x15}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:26:37 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x3f00000000000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2835.845287] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2835.905842] XFS (loop2): Mounting V4 Filesystem [ 2835.934185] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2835.966352] XFS (loop2): totally zeroed log [ 2835.970027] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2835.983491] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2835.993666] XFS (loop2): Failed to read root inode 0x900000000000d88, error 22 09:26:37 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000300000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:37 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0) 09:26:37 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x01', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:37 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0) [ 2836.188721] FAT-fs (loop1): invalid media value (0x00) [ 2836.194112] FAT-fs (loop1): Can't find a valid FAT filesystem 09:26:38 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000010a00000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2836.383936] XFS (loop0): Mounting V4 Filesystem 09:26:38 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0) [ 2836.409503] XFS (loop0): totally zeroed log [ 2836.419721] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2836.445437] XFS (loop0): Unmount and run xfs_repair 09:26:38 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x8004000000000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2836.468196] XFS (loop0): First 128 bytes of corrupted metadata buffer: 09:26:38 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x02', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2836.524713] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2836.548096] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2836.580168] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2836.599187] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2836.637751] XFS (loop2): Mounting V4 Filesystem [ 2836.641749] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2836.675376] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2836.701080] XFS (loop2): totally zeroed log [ 2836.706509] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:38 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0) [ 2836.744241] XFS (loop2): Failed to read root inode 0xa00000000000d88, error 22 [ 2836.763997] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2836.827629] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2836.851934] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2836.906498] XFS (loop0): Failed to read root inode 0xd88, error 117 09:26:38 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:26:38 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x02', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:38 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0) 09:26:38 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000400000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:38 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000004000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:39 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0) 09:26:39 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) [ 2837.557902] XFS (loop0): Mounting V4 Filesystem [ 2837.584302] XFS (loop0): totally zeroed log 09:26:39 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x8cffffff00000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2837.605047] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2837.641215] XFS (loop0): Unmount and run xfs_repair [ 2837.654135] XFS (loop2): filesystem is marked as having an external log; specify logdev on the mount command line. [ 2837.660272] XFS (loop0): First 128 bytes of corrupted metadata buffer: 09:26:39 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0) [ 2837.695711] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2837.696458] XFS (loop2): SB validate failed with error -22. [ 2837.704409] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2837.725862] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2837.744148] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2837.771532] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2837.786428] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2837.794737] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2837.806831] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2837.832671] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 09:26:39 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2837.852437] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 09:26:39 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0) 09:26:39 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) [ 2837.927135] XFS (loop0): Failed to read root inode 0xd88, error 117 09:26:39 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000014000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:39 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0) [ 2838.042041] XFS (loop4): Mounting V4 Filesystem [ 2838.048686] XFS (loop4): totally zeroed log [ 2838.053598] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 09:26:39 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:39 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000500000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:39 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, 0x0, &(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0) [ 2838.429633] XFS (loop2): Mounting V4 Filesystem 09:26:40 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, 0x0, &(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0) [ 2838.508821] XFS (loop2): totally zeroed log 09:26:40 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:26:40 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0xe5ffffff00000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2838.539450] XFS (loop2): Failed to read root inode 0x4000000000000d88, error 22 [ 2838.548857] XFS (loop4): Mounting V4 Filesystem [ 2838.561803] XFS (loop4): totally zeroed log [ 2838.572794] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2838.609205] XFS (loop0): Mounting V4 Filesystem [ 2838.631915] XFS (loop0): totally zeroed log 09:26:40 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, 0x0, &(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0) [ 2838.682841] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 09:26:40 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000004700000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2838.826459] XFS (loop0): Unmount and run xfs_repair [ 2838.832798] XFS (loop0): First 128 bytes of corrupted metadata buffer: 09:26:40 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2838.872141] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:40 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:26:40 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, 0x0, &(0x7f0000000200)={'syz', 0x2}, 0x0) [ 2838.929931] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2838.967984] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2838.996151] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2839.011517] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2839.020331] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2839.034901] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2839.043491] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2839.058190] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2839.141369] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 09:26:40 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, 0x0, &(0x7f0000000200)={'syz', 0x2}, 0x0) [ 2839.183080] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2839.205514] XFS (loop4): Mounting V4 Filesystem [ 2839.260727] XFS (loop4): totally zeroed log 09:26:41 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) [ 2839.290712] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2839.310003] XFS (loop2): filesystem is marked as having an external log; specify logdev on the mount command line. [ 2839.348992] XFS (loop2): SB validate failed with error -22. 09:26:41 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000600000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:41 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, 0x0, &(0x7f0000000200)={'syz', 0x2}, 0x0) 09:26:41 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:26:41 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2839.725142] XFS (loop0): Mounting V4 Filesystem 09:26:41 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000004800000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:41 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0xf6ffffff00000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:26:41 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000140)='keyring\x00', 0x0, 0x0) [ 2839.756747] XFS (loop0): totally zeroed log [ 2839.768949] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2839.778823] XFS (loop0): Unmount and run xfs_repair [ 2839.783849] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2839.810606] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2839.829380] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2839.837689] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2839.845943] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2839.857624] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2839.891090] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2839.901423] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2839.910154] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2839.910209] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2839.929363] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 09:26:41 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000140)='keyring\x00', 0x0, 0x0) [ 2839.996776] XFS (loop0): Failed to read root inode 0xd88, error 117 09:26:41 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) [ 2840.135300] XFS (loop4): Mounting V4 Filesystem [ 2840.144279] XFS (loop2): filesystem is marked as having an external log; specify logdev on the mount command line. [ 2840.156643] XFS (loop2): SB validate failed with error -22. [ 2840.172382] XFS (loop4): totally zeroed log 09:26:41 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000140)='keyring\x00', 0x0, 0x0) [ 2840.191892] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2840.253230] XFS (loop0): Mounting V4 Filesystem [ 2840.274347] XFS (loop0): totally zeroed log [ 2840.319787] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2840.332747] XFS (loop0): Unmount and run xfs_repair [ 2840.353381] XFS (loop0): First 128 bytes of corrupted metadata buffer: 09:26:42 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x01', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2840.372828] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2840.397411] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2840.442051] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2840.454248] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:42 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0) [ 2840.484312] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2840.504506] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2840.535807] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2840.544101] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2840.552693] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2840.562458] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2840.571128] XFS (loop0): Failed to read root inode 0xd88, error 117 09:26:42 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000800000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:42 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:26:42 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000016500000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:42 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0xf700000000000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:26:42 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0) 09:26:42 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x03', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:42 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0) 09:26:42 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) [ 2841.148860] XFS (loop2): Mounting V4 Filesystem [ 2841.157631] XFS (loop2): totally zeroed log [ 2841.176974] XFS (loop0): Mounting V4 Filesystem 09:26:42 executing program 5: r0 = epoll_create1(0x0) flock(r0, 0x1) r1 = epoll_create1(0x0) flock(r1, 0x2) r2 = gettid() dup2(r0, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400218) tkill(r2, 0x1000000000016) [ 2841.213332] XFS (loop2): Failed to read root inode 0x6500000000000d88, error 22 [ 2841.223591] XFS (loop0): totally zeroed log 09:26:43 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2841.269736] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2841.293958] XFS (loop0): Unmount and run xfs_repair [ 2841.313176] XFS (loop0): First 128 bytes of corrupted metadata buffer: 09:26:43 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0xfeffffff00000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2841.324924] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2841.343180] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2841.354354] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2841.369154] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2841.381867] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2841.393614] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2841.405174] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2841.419824] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2841.430286] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2841.494344] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 09:26:43 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000016600000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2841.535939] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2841.666675] XFS (loop4): Mounting V4 Filesystem [ 2841.682443] XFS (loop4): totally zeroed log [ 2841.692520] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 09:26:43 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001001000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:43 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0xffffffff00000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:26:43 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2841.976701] XFS (loop2): Mounting V4 Filesystem [ 2841.985937] XFS (loop2): totally zeroed log [ 2841.998229] XFS (loop2): Failed to read root inode 0x6600000000000d88, error 22 09:26:43 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) [ 2842.200960] XFS (loop4): Mounting V4 Filesystem [ 2842.211867] XFS (loop4): totally zeroed log 09:26:43 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000017000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2842.245773] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2842.255134] XFS (loop0): Mounting V4 Filesystem [ 2842.278393] XFS (loop0): totally zeroed log [ 2842.295585] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2842.332437] XFS (loop0): Unmount and run xfs_repair [ 2842.366358] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2842.380357] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2842.408784] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2842.425220] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2842.459841] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2842.474907] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:44 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2842.524548] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2842.542300] XFS (loop2): Mounting V4 Filesystem [ 2842.564818] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2842.575641] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2842.576176] XFS (loop2): totally zeroed log [ 2842.588326] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2842.668718] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2842.695900] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2842.710489] XFS (loop2): Failed to read root inode 0x7000000000000d88, error 22 [ 2842.888410] XFS (loop4): Mounting V4 Filesystem [ 2842.905832] XFS (loop4): totally zeroed log [ 2842.935330] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 09:26:44 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0xfffffffffffff000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:26:45 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) [ 2843.373504] attempt to access beyond end of device [ 2843.383354] loop1: rw=1, want=130, limit=112 [ 2843.390053] buffer_io_error: 14 callbacks suppressed [ 2843.390087] Buffer I/O error on dev loop1, logical block 129, lost async page write [ 2843.410337] attempt to access beyond end of device [ 2843.415291] loop1: rw=1, want=131, limit=112 [ 2843.420039] Buffer I/O error on dev loop1, logical block 130, lost async page write [ 2843.428189] attempt to access beyond end of device [ 2843.433138] loop1: rw=1, want=132, limit=112 [ 2843.437928] Buffer I/O error on dev loop1, logical block 131, lost async page write [ 2843.445760] attempt to access beyond end of device [ 2843.451025] loop1: rw=1, want=133, limit=112 [ 2843.455478] Buffer I/O error on dev loop1, logical block 132, lost async page write [ 2843.476743] attempt to access beyond end of device [ 2843.481697] loop1: rw=1, want=142, limit=112 [ 2843.488549] Buffer I/O error on dev loop1, logical block 141, lost async page write [ 2843.496719] attempt to access beyond end of device [ 2843.502437] loop1: rw=1, want=143, limit=112 [ 2843.508325] Buffer I/O error on dev loop1, logical block 142, lost async page write [ 2843.516166] attempt to access beyond end of device [ 2843.521559] loop1: rw=1, want=144, limit=112 [ 2843.525993] Buffer I/O error on dev loop1, logical block 143, lost async page write [ 2843.526028] attempt to access beyond end of device [ 2843.539924] loop1: rw=1, want=145, limit=112 [ 2843.544531] Buffer I/O error on dev loop1, logical block 144, lost async page write [ 2843.559460] attempt to access beyond end of device [ 2843.574227] loop1: rw=1, want=4241, limit=112 [ 2843.596954] attempt to access beyond end of device [ 2843.601908] loop1: rw=1, want=5593, limit=112 [ 2843.611223] attempt to access beyond end of device [ 2843.616181] loop1: rw=1, want=5622, limit=112 [ 2843.647124] Buffer I/O error on dev loop1, logical block 5621, lost async page write [ 2843.655053] attempt to access beyond end of device [ 2843.673500] loop1: rw=1, want=5623, limit=112 [ 2843.678914] Buffer I/O error on dev loop1, logical block 5622, lost async page write [ 2843.686895] attempt to access beyond end of device [ 2843.691846] loop1: rw=1, want=5624, limit=112 [ 2843.707384] attempt to access beyond end of device [ 2843.715518] loop1: rw=1, want=5625, limit=112 [ 2843.729913] attempt to access beyond end of device [ 2843.736678] loop1: rw=1, want=5646, limit=112 [ 2843.741219] attempt to access beyond end of device [ 2843.746162] loop1: rw=1, want=5647, limit=112 [ 2843.756531] attempt to access beyond end of device [ 2843.761491] loop1: rw=1, want=5648, limit=112 [ 2843.766024] attempt to access beyond end of device [ 2843.786344] loop1: rw=1, want=5649, limit=112 [ 2843.790921] attempt to access beyond end of device [ 2843.795870] loop1: rw=1, want=5698, limit=112 [ 2843.816354] attempt to access beyond end of device [ 2843.821305] loop1: rw=1, want=5699, limit=112 [ 2843.825838] attempt to access beyond end of device [ 2843.830871] loop1: rw=1, want=5700, limit=112 [ 2843.835405] attempt to access beyond end of device [ 2843.846514] loop1: rw=1, want=5701, limit=112 [ 2843.851211] attempt to access beyond end of device [ 2843.856161] loop1: rw=1, want=5710, limit=112 [ 2843.866347] attempt to access beyond end of device [ 2843.871304] loop1: rw=1, want=5711, limit=112 [ 2843.875832] attempt to access beyond end of device [ 2843.888959] loop1: rw=1, want=5712, limit=112 [ 2843.893644] attempt to access beyond end of device [ 2843.905141] loop1: rw=1, want=5713, limit=112 [ 2843.920115] attempt to access beyond end of device [ 2843.925088] loop1: rw=1, want=9809, limit=112 [ 2843.939793] attempt to access beyond end of device [ 2843.944750] loop1: rw=1, want=13905, limit=112 [ 2843.957895] attempt to access beyond end of device [ 2843.962849] loop1: rw=1, want=18001, limit=112 [ 2843.989341] attempt to access beyond end of device [ 2843.994358] loop1: rw=1, want=22097, limit=112 [ 2844.009368] attempt to access beyond end of device [ 2844.019969] loop1: rw=1, want=26193, limit=112 [ 2844.046829] attempt to access beyond end of device [ 2844.052853] loop1: rw=1, want=30289, limit=112 [ 2844.061826] attempt to access beyond end of device [ 2844.066896] loop1: rw=1, want=31249, limit=112 09:26:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpgid(0xffffffffffffffff) rt_sigpending(0x0, 0x0) shmget(0x3, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x0, @multicast1}, 0x10) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @mcast1}}]}, 0x110) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f00000000c0)={{0x2, 0x4e22, @loopback}, {0x0, @random="fe8596dbf858"}, 0x0, {0x2, 0x4e24, @loopback}, 'bridge_slave_0\x00'}) 09:26:46 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000a01000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:46 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x02', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:46 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000017100000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:46 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:46 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x2) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:26:46 executing program 5: [ 2844.546386] XFS (loop2): Mounting V4 Filesystem [ 2844.559123] XFS (loop2): totally zeroed log [ 2844.577898] XFS (loop2): Failed to read root inode 0x7100000000000d88, error 22 [ 2844.628374] XFS (loop0): Mounting V4 Filesystem [ 2844.663639] XFS (loop0): totally zeroed log [ 2844.705533] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2844.729042] XFS (loop0): Unmount and run xfs_repair [ 2844.752093] XFS (loop0): First 128 bytes of corrupted metadata buffer: 09:26:46 executing program 5: [ 2844.785623] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2844.805397] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2844.813839] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2844.828588] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2844.839780] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2844.849361] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2844.859847] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2844.869255] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2844.879704] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2844.896044] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2844.911794] XFS (loop0): Failed to read root inode 0xd88, error 117 09:26:46 executing program 5: [ 2844.974166] XFS (loop2): Mounting V4 Filesystem [ 2844.980646] XFS (loop2): totally zeroed log [ 2844.985508] XFS (loop2): Failed to read root inode 0x7100000000000d88, error 22 [ 2844.985838] XFS (loop4): Mounting V4 Filesystem [ 2845.031190] XFS (loop4): totally zeroed log 09:26:46 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000009b00000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:46 executing program 5: [ 2845.088161] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2845.512748] XFS (loop2): filesystem is marked as having an external log; specify logdev on the mount command line. [ 2845.535941] XFS (loop2): SB validate failed with error -22. 09:26:47 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:26:47 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001001c01000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:47 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x3) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:26:47 executing program 5: 09:26:47 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:47 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000009c00000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:47 executing program 5: [ 2845.972739] XFS (loop0): Mounting V4 Filesystem [ 2845.991893] XFS (loop4): Mounting V4 Filesystem [ 2846.003235] XFS (loop2): filesystem is marked as having an external log; specify logdev on the mount command line. [ 2846.015530] XFS (loop0): totally zeroed log 09:26:47 executing program 5: [ 2846.025428] XFS (loop4): totally zeroed log [ 2846.031004] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2846.040893] XFS (loop2): SB validate failed with error -22. [ 2846.048034] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2846.055269] XFS (loop0): Unmount and run xfs_repair [ 2846.095287] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2846.113312] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2846.159330] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:47 executing program 5: [ 2846.203132] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2846.230919] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:47 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000000c000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2846.265986] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2846.301038] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:48 executing program 5: 09:26:48 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x02', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2846.348396] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2846.363480] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2846.390745] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2846.441599] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2846.506504] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2846.551331] XFS (loop2): filesystem is marked as having an external log; specify logdev on the mount command line. [ 2846.597368] XFS (loop2): SB validate failed with error -22. 09:26:48 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:26:48 executing program 5: 09:26:48 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000003000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:48 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000000010000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:48 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x02', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:48 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x4) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:26:48 executing program 5: 09:26:49 executing program 5: [ 2847.436141] XFS (loop2): filesystem is marked as having an external log; specify logdev on the mount command line. 09:26:49 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:49 executing program 5: [ 2847.476431] XFS (loop2): SB validate failed with error -22. [ 2847.504173] XFS (loop0): Mounting V4 Filesystem [ 2847.513785] XFS (loop0): totally zeroed log [ 2847.522748] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2847.544275] XFS (loop0): Unmount and run xfs_repair 09:26:49 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x5) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2847.583942] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2847.601615] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2847.624610] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2847.662177] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2847.671142] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:49 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040200000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2847.780588] XFS (loop4): Mounting V4 Filesystem [ 2847.796475] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2847.806789] XFS (loop4): totally zeroed log [ 2847.809562] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2847.828288] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2847.838059] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2847.866522] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2847.893610] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2847.911834] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2847.943850] XFS (loop2): Mounting V4 Filesystem [ 2847.958338] XFS (loop2): totally zeroed log [ 2847.964292] XFS (loop2): Failed to read root inode 0x200000000000d88, error 22 [ 2848.000603] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2848.195793] XFS (loop2): Mounting V4 Filesystem [ 2848.231356] XFS (loop2): totally zeroed log [ 2848.236180] XFS (loop2): Failed to read root inode 0x200000000000d88, error 22 09:26:50 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:26:50 executing program 5: 09:26:50 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:50 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:26:50 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001008004000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:50 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040400000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:50 executing program 5: 09:26:50 executing program 5: 09:26:50 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x7) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2848.685357] XFS (loop4): Mounting V4 Filesystem [ 2848.701922] XFS (loop0): Mounting V4 Filesystem [ 2848.707825] XFS (loop4): totally zeroed log [ 2848.727752] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 09:26:50 executing program 5: [ 2848.736694] XFS (loop0): totally zeroed log [ 2848.744052] XFS (loop2): Mounting V4 Filesystem [ 2848.754504] XFS (loop2): totally zeroed log [ 2848.756541] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2848.771740] XFS (loop2): Failed to read root inode 0x400000000000d88, error 22 [ 2848.798665] XFS (loop0): Unmount and run xfs_repair [ 2848.819705] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2848.838019] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2848.867046] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2848.888218] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2848.907629] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:50 executing program 5: [ 2848.916153] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2848.933482] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2848.942255] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:50 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x87', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2848.994284] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2849.031480] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2849.126413] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2849.134942] XFS (loop0): Failed to read root inode 0xd88, error 117 09:26:51 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:26:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x40000) 09:26:51 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0xf) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:26:51 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040500000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:51 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:51 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000005000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:51 executing program 5: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) lseek(r0, 0x0, 0x4) [ 2849.753602] XFS (loop0): Mounting V4 Filesystem 09:26:51 executing program 5: pipe2(0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000005ed0050bfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000012d400500000000005504000001ed00001d040000000000002c460000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000740)=""/122) recvfrom(0xffffffffffffffff, &(0x7f0000000a40)=""/79, 0x4f, 0x40000000, &(0x7f0000000ac0)=@l2={0x1f, 0xffff, {0x0, 0x4, 0x101, 0x0, 0x2c39, 0x1}, 0x40, 0x40}, 0x80) getgroups(0x6, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0xee00]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) mkdir(&(0x7f0000000240)='./file0\x00', 0x11) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in6=@remote}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000540)=0xe8) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000280)={0x0, 0x1, {0x0, 0x7, 0x6, 0x7, 0x6, 0xfd35, 0x5, 0xf1}}) exit(0xffffffffa0018000) [ 2849.788722] XFS (loop0): totally zeroed log [ 2849.802338] XFS (loop4): Mounting V4 Filesystem [ 2849.817340] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2849.834696] XFS (loop4): totally zeroed log [ 2849.852112] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2849.853700] XFS (loop0): Unmount and run xfs_repair [ 2849.867284] XFS (loop2): Mounting V4 Filesystem [ 2849.886542] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2849.906484] XFS (loop2): totally zeroed log [ 2849.912311] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2849.921421] XFS (loop2): Failed to read root inode 0x500000000000d88, error 22 [ 2849.936559] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2849.957395] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2849.965656] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2849.986384] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:51 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2850.003932] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:51 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000000)='./file1\x00', 0x40, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) r2 = getpid() r3 = getpid() rt_tgsigqueueinfo(r2, r3, 0x1a, &(0x7f0000000580)) [ 2850.038837] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2850.055791] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2850.076223] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2850.087527] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2850.096189] XFS (loop0): Failed to read root inode 0xd88, error 117 09:26:52 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040700000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:52 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000006000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2850.738564] XFS (loop4): Mounting V4 Filesystem [ 2850.783488] XFS (loop4): totally zeroed log [ 2850.867621] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 09:26:52 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:26:52 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x200, 0x0) mmap(&(0x7f0000701000/0x2000)=nil, 0x2000, 0x0, 0x20012, r0, 0x0) [ 2850.997899] attempt to access beyond end of device [ 2851.033185] loop1: rw=1, want=130, limit=112 09:26:52 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x10) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2851.060606] buffer_io_error: 14 callbacks suppressed [ 2851.060615] Buffer I/O error on dev loop1, logical block 129, lost async page write [ 2851.087890] XFS (loop0): Mounting V4 Filesystem [ 2851.118831] attempt to access beyond end of device [ 2851.120839] XFS (loop0): totally zeroed log [ 2851.123909] loop1: rw=1, want=131, limit=112 [ 2851.139027] Buffer I/O error on dev loop1, logical block 130, lost async page write [ 2851.148150] XFS (loop2): Mounting V4 Filesystem [ 2851.158206] attempt to access beyond end of device 09:26:52 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:52 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x7) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2851.166738] XFS (loop2): totally zeroed log [ 2851.166832] loop1: rw=1, want=132, limit=112 [ 2851.185782] Buffer I/O error on dev loop1, logical block 131, lost async page write [ 2851.194144] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2851.227967] attempt to access beyond end of device [ 2851.232740] XFS (loop2): Failed to read root inode 0x700000000000d88, error 22 [ 2851.237721] loop1: rw=1, want=133, limit=112 [ 2851.244203] XFS (loop0): Unmount and run xfs_repair [ 2851.249862] Buffer I/O error on dev loop1, logical block 132, lost async page write [ 2851.274291] attempt to access beyond end of device [ 2851.292192] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2851.301263] loop1: rw=1, want=142, limit=112 [ 2851.317113] Buffer I/O error on dev loop1, logical block 141, lost async page write [ 2851.344601] attempt to access beyond end of device [ 2851.350140] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2851.363196] loop1: rw=1, want=143, limit=112 [ 2851.371929] Buffer I/O error on dev loop1, logical block 142, lost async page write [ 2851.384646] attempt to access beyond end of device [ 2851.389971] loop1: rw=1, want=144, limit=112 [ 2851.425246] Buffer I/O error on dev loop1, logical block 143, lost async page write [ 2851.436627] XFS (loop4): Mounting V4 Filesystem [ 2851.439004] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2851.472750] XFS (loop4): totally zeroed log [ 2851.484014] attempt to access beyond end of device [ 2851.495168] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 09:26:53 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040800000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2851.516211] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2851.517618] loop1: rw=1, want=145, limit=112 [ 2851.532256] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2851.545380] Buffer I/O error on dev loop1, logical block 144, lost async page write [ 2851.562417] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2851.570881] attempt to access beyond end of device [ 2851.595377] loop1: rw=1, want=3225, limit=112 [ 2851.603145] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2851.611621] attempt to access beyond end of device [ 2851.621368] loop1: rw=1, want=3254, limit=112 [ 2851.630780] Buffer I/O error on dev loop1, logical block 3253, lost async page write [ 2851.634806] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2851.664144] attempt to access beyond end of device [ 2851.673882] loop1: rw=1, want=3255, limit=112 [ 2851.676004] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2851.683035] Buffer I/O error on dev loop1, logical block 3254, lost async page write 09:26:53 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x03', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2851.737147] attempt to access beyond end of device [ 2851.753437] loop1: rw=1, want=3256, limit=112 [ 2851.775593] attempt to access beyond end of device [ 2851.808004] XFS (loop2): Mounting V4 Filesystem [ 2851.817140] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2851.826369] loop1: rw=1, want=3257, limit=112 [ 2851.833600] attempt to access beyond end of device [ 2851.850384] XFS (loop2): totally zeroed log [ 2851.855315] loop1: rw=1, want=3278, limit=112 [ 2851.874882] XFS (loop2): Failed to read root inode 0x800000000000d88, error 22 [ 2851.876377] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2851.897990] attempt to access beyond end of device [ 2851.912196] loop1: rw=1, want=3279, limit=112 [ 2851.919431] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2851.929497] attempt to access beyond end of device [ 2851.945808] loop1: rw=1, want=3280, limit=112 [ 2851.966816] attempt to access beyond end of device [ 2851.983099] loop1: rw=1, want=3281, limit=112 [ 2851.994960] attempt to access beyond end of device [ 2852.014163] loop1: rw=1, want=3330, limit=112 [ 2852.022228] attempt to access beyond end of device [ 2852.034025] loop1: rw=1, want=3331, limit=112 09:26:53 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2852.065330] attempt to access beyond end of device [ 2852.099773] loop1: rw=1, want=3332, limit=112 09:26:53 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a00000001000010000000000100010a000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2852.120265] attempt to access beyond end of device 09:26:53 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040900000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2852.143143] loop1: rw=1, want=3333, limit=112 [ 2852.154313] attempt to access beyond end of device [ 2852.161789] loop1: rw=1, want=3342, limit=112 [ 2852.184678] attempt to access beyond end of device [ 2852.211231] loop1: rw=1, want=3343, limit=112 [ 2852.237647] attempt to access beyond end of device [ 2852.244507] loop1: rw=1, want=3344, limit=112 [ 2852.260714] attempt to access beyond end of device 09:26:54 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2852.302619] loop1: rw=1, want=3345, limit=112 [ 2852.357650] attempt to access beyond end of device [ 2852.364614] loop1: rw=1, want=7441, limit=112 [ 2852.382338] attempt to access beyond end of device [ 2852.388198] loop1: rw=1, want=11537, limit=112 [ 2852.408985] XFS (loop2): Mounting V4 Filesystem [ 2852.432874] XFS (loop0): Mounting V4 Filesystem 09:26:54 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x13) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2852.454516] XFS (loop4): Mounting V4 Filesystem [ 2852.462650] XFS (loop0): totally zeroed log [ 2852.467389] XFS (loop2): totally zeroed log [ 2852.485608] XFS (loop4): totally zeroed log [ 2852.485684] XFS (loop2): Failed to read root inode 0x900000000000d88, error 22 [ 2852.494540] attempt to access beyond end of device [ 2852.504195] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2852.518210] loop1: rw=1, want=15633, limit=112 [ 2852.540862] XFS (loop0): Unmount and run xfs_repair [ 2852.566005] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2852.584717] attempt to access beyond end of device [ 2852.596720] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2852.604823] loop1: rw=1, want=19729, limit=112 [ 2852.622137] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2852.624893] attempt to access beyond end of device [ 2852.636634] loop1: rw=1, want=23825, limit=112 [ 2852.645315] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2852.650526] attempt to access beyond end of device [ 2852.658605] loop1: rw=1, want=27921, limit=112 [ 2852.669913] attempt to access beyond end of device [ 2852.672055] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2852.674975] loop1: rw=1, want=30225, limit=112 [ 2852.705126] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2852.720138] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2852.730664] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2852.744451] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2852.755463] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2852.765131] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2852.855933] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2852.878015] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2853.048985] XFS (loop5): Mounting V4 Filesystem [ 2853.054602] XFS (loop5): totally zeroed log [ 2853.063659] XFS (loop5): Failed to read root inode 0x189a000000000d88, error 22 09:26:55 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:26:55 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040a00000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:55 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x01', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:55 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x60) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:26:55 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a00000001000010000000000100011c000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:55 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x3) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2853.826048] XFS (loop0): Mounting V4 Filesystem 09:26:55 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x3) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2853.876678] XFS (loop0): totally zeroed log [ 2853.891251] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 09:26:55 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0xf0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:26:55 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2853.945020] XFS (loop2): Mounting V4 Filesystem [ 2853.946127] XFS (loop0): Unmount and run xfs_repair [ 2853.962058] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2853.963692] XFS (loop2): totally zeroed log [ 2853.969417] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2853.981608] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2853.990506] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2853.998785] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2853.998797] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2853.998810] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2854.023551] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2854.029010] XFS (loop2): Failed to read root inode 0xa00000000000d88, error 22 [ 2854.031848] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2854.047440] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2854.080103] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2854.090490] XFS (loop0): Failed to read root inode 0xd88, error 117 09:26:56 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a00000001000010000000000100003f000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:56 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040b00000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2854.424890] XFS (loop4): Mounting V4 Filesystem [ 2854.435928] XFS (loop4): totally zeroed log [ 2854.441310] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 09:26:56 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x3) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2854.839186] XFS (loop0): Mounting V4 Filesystem [ 2854.854832] XFS (loop0): totally zeroed log [ 2854.885410] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2854.906314] XFS (loop0): Unmount and run xfs_repair [ 2854.911908] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2854.926707] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2854.936488] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2854.950002] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2854.958723] XFS (loop2): Mounting V4 Filesystem [ 2854.980606] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2855.003386] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2855.012708] XFS (loop2): totally zeroed log [ 2855.016607] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2855.025437] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:26:56 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:26:56 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0xf7) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:26:56 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:56 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000017100000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2855.036916] XFS (loop2): Failed to read root inode 0xb00000000000d88, error 22 [ 2855.041919] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2855.072832] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2855.083433] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2855.094598] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2855.234526] XFS (loop5): Mounting V4 Filesystem [ 2855.265851] XFS (loop5): totally zeroed log [ 2855.311309] XFS (loop5): Failed to read root inode 0x7100000000000d88, error 22 09:26:57 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000480000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:57 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x300) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2855.356424] XFS (loop4): Mounting V4 Filesystem [ 2855.362454] XFS (loop4): totally zeroed log [ 2855.367878] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 09:26:57 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040e00000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:57 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000800000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:57 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) [ 2855.747682] XFS (loop5): Mounting V4 Filesystem [ 2855.773985] XFS (loop5): totally zeroed log [ 2855.792384] XFS (loop5): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 09:26:57 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x03', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2855.834803] XFS (loop2): Mounting V4 Filesystem [ 2855.835668] XFS (loop5): Unmount and run xfs_repair [ 2855.862402] XFS (loop2): totally zeroed log [ 2855.866400] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 2855.873406] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2855.884433] XFS (loop2): Failed to read root inode 0xe00000000000d88, error 22 [ 2855.943974] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2855.964635] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2855.998410] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2856.026687] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2856.042838] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2856.059300] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2856.076473] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2856.092608] XFS (loop5): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2856.114154] XFS (loop5): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2856.123415] XFS (loop0): Mounting V4 Filesystem [ 2856.131148] XFS (loop0): totally zeroed log [ 2856.152506] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2856.163355] XFS (loop5): Failed to read root inode 0xd88, error 117 [ 2856.185120] XFS (loop0): Unmount and run xfs_repair 09:26:57 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040005000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2856.204192] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2856.227366] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2856.245313] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2856.254437] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2856.263010] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2856.272060] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2856.286228] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2856.300290] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2856.314103] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2856.327925] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2856.343216] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2856.400998] XFS (loop0): Failed to read root inode 0xd88, error 117 09:26:58 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x01', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:58 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040e00000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:58 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000880000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:58 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x480) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2856.595916] XFS (loop2): Mounting V4 Filesystem [ 2856.642207] XFS (loop2): totally zeroed log [ 2856.647219] XFS (loop2): Failed to read root inode 0x5000000000d88, error 22 09:26:58 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) [ 2856.773690] XFS (loop5): Mounting V4 Filesystem [ 2856.782783] XFS (loop5): totally zeroed log [ 2856.811922] XFS (loop5): Failed to read root inode 0xe00000000000d88, error 22 09:26:58 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040007000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:58 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2856.977466] XFS (loop0): Mounting V4 Filesystem [ 2856.988749] XFS (loop0): totally zeroed log [ 2857.029177] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2857.116540] XFS (loop0): Unmount and run xfs_repair [ 2857.121885] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2857.165186] XFS (loop2): Mounting V4 Filesystem [ 2857.181755] XFS (loop2): totally zeroed log [ 2857.195506] XFS (loop2): Failed to read root inode 0x7000000000d88, error 22 [ 2857.209283] XFS (loop4): Mounting V4 Filesystem 09:26:58 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040005000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2857.214280] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2857.266666] XFS (loop4): totally zeroed log [ 2857.273413] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2857.292205] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2857.323811] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2857.401213] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2857.521731] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2857.625408] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2857.670831] XFS (loop5): Mounting V4 Filesystem [ 2857.690703] XFS (loop5): totally zeroed log [ 2857.699153] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2857.719544] XFS (loop5): Failed to read root inode 0x5000000000d88, error 22 [ 2857.739891] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2857.821333] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2857.891610] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2857.931205] XFS (loop0): Failed to read root inode 0xd88, error 117 09:26:59 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040009000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:59 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) [ 2858.020780] attempt to access beyond end of device [ 2858.025877] loop1: rw=1, want=130, limit=112 [ 2858.030602] buffer_io_error: 14 callbacks suppressed [ 2858.030611] Buffer I/O error on dev loop1, logical block 129, lost async page write [ 2858.043909] attempt to access beyond end of device [ 2858.049524] loop1: rw=1, want=131, limit=112 [ 2858.054059] Buffer I/O error on dev loop1, logical block 130, lost async page write [ 2858.062429] attempt to access beyond end of device 09:26:59 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x500) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2858.067650] loop1: rw=1, want=132, limit=112 [ 2858.086990] Buffer I/O error on dev loop1, logical block 131, lost async page write [ 2858.094908] attempt to access beyond end of device [ 2858.102045] loop1: rw=1, want=133, limit=112 [ 2858.106614] Buffer I/O error on dev loop1, logical block 132, lost async page write [ 2858.114454] attempt to access beyond end of device 09:26:59 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001006b6b6b0000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:59 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x03', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:26:59 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) [ 2858.156447] loop1: rw=1, want=142, limit=112 [ 2858.160895] Buffer I/O error on dev loop1, logical block 141, lost async page write [ 2858.185916] attempt to access beyond end of device [ 2858.232645] loop1: rw=1, want=143, limit=112 [ 2858.243604] Buffer I/O error on dev loop1, logical block 142, lost async page write [ 2858.251719] attempt to access beyond end of device [ 2858.262461] loop1: rw=1, want=144, limit=112 [ 2858.266976] Buffer I/O error on dev loop1, logical block 143, lost async page write [ 2858.282455] attempt to access beyond end of device [ 2858.303002] loop1: rw=1, want=145, limit=112 [ 2858.308195] Buffer I/O error on dev loop1, logical block 144, lost async page write [ 2858.327795] attempt to access beyond end of device [ 2858.333000] loop1: rw=1, want=4241, limit=112 [ 2858.347878] attempt to access beyond end of device [ 2858.352998] loop1: rw=1, want=8337, limit=112 [ 2858.407928] attempt to access beyond end of device [ 2858.442665] loop1: rw=1, want=9817, limit=112 [ 2858.487367] XFS (loop2): Mounting V4 Filesystem [ 2858.491324] attempt to access beyond end of device [ 2858.514664] XFS (loop2): totally zeroed log [ 2858.518415] loop1: rw=1, want=9846, limit=112 [ 2858.533125] XFS (loop2): Failed to read root inode 0x9000000000d88, error 22 [ 2858.561419] Buffer I/O error on dev loop1, logical block 9845, lost async page write [ 2858.589857] attempt to access beyond end of device [ 2858.606027] XFS (loop0): Mounting V4 Filesystem 09:27:00 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0xf00000000000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2858.623863] loop1: rw=1, want=9847, limit=112 [ 2858.632211] XFS (loop0): totally zeroed log [ 2858.641613] Buffer I/O error on dev loop1, logical block 9846, lost async page write [ 2858.641712] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2858.651730] attempt to access beyond end of device 09:27:00 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2858.694223] XFS (loop0): Unmount and run xfs_repair [ 2858.699322] loop1: rw=1, want=9848, limit=112 [ 2858.712716] attempt to access beyond end of device [ 2858.715934] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2858.724669] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2858.725718] loop1: rw=1, want=9849, limit=112 [ 2858.738008] attempt to access beyond end of device [ 2858.743175] loop1: rw=1, want=9870, limit=112 [ 2858.744233] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2858.748212] attempt to access beyond end of device [ 2858.771049] loop1: rw=1, want=9871, limit=112 [ 2858.774998] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2858.780337] attempt to access beyond end of device [ 2858.790267] loop1: rw=1, want=9872, limit=112 [ 2858.790534] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2858.794924] attempt to access beyond end of device [ 2858.808443] loop1: rw=1, want=9873, limit=112 [ 2858.813154] attempt to access beyond end of device [ 2858.818594] loop1: rw=1, want=9922, limit=112 [ 2858.819916] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2858.823266] attempt to access beyond end of device 09:27:00 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000004000a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2858.860202] loop1: rw=1, want=9923, limit=112 [ 2858.862229] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2858.865995] attempt to access beyond end of device [ 2858.894719] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2858.943809] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2858.947032] loop1: rw=1, want=9924, limit=112 [ 2858.953360] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2858.973832] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2858.976086] attempt to access beyond end of device [ 2858.999261] loop1: rw=1, want=9925, limit=112 [ 2859.006720] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2859.008483] attempt to access beyond end of device [ 2859.029148] loop1: rw=1, want=9934, limit=112 [ 2859.036675] attempt to access beyond end of device [ 2859.045160] loop1: rw=1, want=9935, limit=112 [ 2859.053202] attempt to access beyond end of device 09:27:00 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x500000000000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2859.077548] loop1: rw=1, want=9936, limit=112 [ 2859.092764] attempt to access beyond end of device [ 2859.105814] loop1: rw=1, want=9937, limit=112 [ 2859.144962] attempt to access beyond end of device [ 2859.179268] loop1: rw=1, want=14033, limit=112 [ 2859.202701] attempt to access beyond end of device [ 2859.207820] loop1: rw=1, want=18129, limit=112 [ 2859.222395] attempt to access beyond end of device [ 2859.227464] loop1: rw=1, want=22225, limit=112 [ 2859.234088] XFS (loop4): Mounting V4 Filesystem [ 2859.237240] attempt to access beyond end of device [ 2859.254324] loop1: rw=1, want=26321, limit=112 [ 2859.284688] XFS (loop4): totally zeroed log 09:27:01 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000100035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2859.305885] attempt to access beyond end of device [ 2859.314359] loop1: rw=1, want=30417, limit=112 [ 2859.326575] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2859.371120] attempt to access beyond end of device [ 2859.376068] loop1: rw=1, want=31137, limit=112 [ 2859.407966] XFS (loop2): Mounting V4 Filesystem 09:27:01 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x500000000000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2859.424239] XFS (loop2): totally zeroed log [ 2859.457935] XFS (loop2): Failed to read root inode 0xa000000000d88, error 22 [ 2859.525055] XFS (loop4): Mounting V4 Filesystem [ 2859.559057] XFS (loop4): totally zeroed log [ 2859.563873] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 09:27:01 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2859.782199] XFS (loop0): Mounting V4 Filesystem [ 2859.801341] XFS (loop0): Log size 16778074 blocks too large, maximum size is 1048576 blocks [ 2859.856658] XFS (loop0): Log size out of supported range. [ 2859.862877] XFS (loop0): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 2859.901959] XFS (loop0): totally zeroed log [ 2859.954123] XFS (loop4): Mounting V4 Filesystem [ 2859.955162] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2859.982231] XFS (loop4): totally zeroed log [ 2860.004605] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2860.029383] XFS (loop0): Unmount and run xfs_repair [ 2860.045111] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2860.059343] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2860.092687] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2860.144284] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2860.192438] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2860.221020] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2860.260527] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2860.321897] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2860.386550] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2860.412805] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2860.490192] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2860.525616] XFS (loop0): Failed to read root inode 0xd88, error 117 09:27:02 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:27:02 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x600) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:02 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000004000b000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:02 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:02 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x500000000000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:02 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000200035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2861.073450] attempt to access beyond end of device [ 2861.078557] loop1: rw=1, want=130, limit=112 [ 2861.083091] attempt to access beyond end of device [ 2861.088196] loop1: rw=1, want=131, limit=112 [ 2861.092709] attempt to access beyond end of device [ 2861.097792] loop1: rw=1, want=132, limit=112 [ 2861.102440] attempt to access beyond end of device [ 2861.107523] loop1: rw=1, want=133, limit=112 [ 2861.111993] attempt to access beyond end of device [ 2861.117407] loop1: rw=1, want=142, limit=112 [ 2861.121885] attempt to access beyond end of device [ 2861.127427] loop1: rw=1, want=143, limit=112 [ 2861.131930] attempt to access beyond end of device [ 2861.137026] loop1: rw=1, want=144, limit=112 [ 2861.141546] attempt to access beyond end of device [ 2861.146685] loop1: rw=1, want=145, limit=112 [ 2861.157529] attempt to access beyond end of device [ 2861.162563] loop1: rw=1, want=4241, limit=112 [ 2861.170356] attempt to access beyond end of device [ 2861.175504] loop1: rw=1, want=4505, limit=112 [ 2861.180365] attempt to access beyond end of device [ 2861.185377] loop1: rw=1, want=4534, limit=112 [ 2861.190251] attempt to access beyond end of device [ 2861.195265] loop1: rw=1, want=4535, limit=112 [ 2861.204454] attempt to access beyond end of device [ 2861.214164] loop1: rw=1, want=4536, limit=112 [ 2861.225962] attempt to access beyond end of device [ 2861.273462] loop1: rw=1, want=4537, limit=112 [ 2861.300107] attempt to access beyond end of device [ 2861.320726] loop1: rw=1, want=4558, limit=112 09:27:03 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) [ 2861.345015] XFS (loop2): Mounting V4 Filesystem [ 2861.360909] attempt to access beyond end of device [ 2861.366823] XFS (loop2): totally zeroed log [ 2861.371974] XFS (loop2): Failed to read root inode 0xb000000000d88, error 22 [ 2861.381652] loop1: rw=1, want=4559, limit=112 [ 2861.386961] attempt to access beyond end of device 09:27:03 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x700) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2861.392792] loop1: rw=1, want=4560, limit=112 [ 2861.399569] XFS (loop4): Mounting V4 Filesystem [ 2861.409907] attempt to access beyond end of device [ 2861.415830] XFS (loop4): totally zeroed log [ 2861.419375] loop1: rw=1, want=4561, limit=112 [ 2861.424845] attempt to access beyond end of device [ 2861.431689] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2861.436817] loop1: rw=1, want=4610, limit=112 [ 2861.444032] attempt to access beyond end of device [ 2861.447255] XFS (loop0): Mounting V4 Filesystem [ 2861.462018] XFS (loop0): Log size 33555290 blocks too large, maximum size is 1048576 blocks [ 2861.473335] loop1: rw=1, want=4611, limit=112 [ 2861.486547] XFS (loop0): Log size out of supported range. [ 2861.497859] XFS (loop0): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 2861.502882] attempt to access beyond end of device [ 2861.511246] XFS (loop0): totally zeroed log [ 2861.520071] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2861.526745] loop1: rw=1, want=4612, limit=112 [ 2861.534919] attempt to access beyond end of device [ 2861.544113] XFS (loop0): Unmount and run xfs_repair [ 2861.550771] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2861.558496] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2861.561428] loop1: rw=1, want=4613, limit=112 [ 2861.567328] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2861.580015] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2861.583065] attempt to access beyond end of device [ 2861.588653] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2861.603684] loop1: rw=1, want=4622, limit=112 [ 2861.617846] attempt to access beyond end of device [ 2861.622925] loop1: rw=1, want=4623, limit=112 [ 2861.627969] attempt to access beyond end of device [ 2861.631031] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2861.632999] loop1: rw=1, want=4624, limit=112 [ 2861.646206] attempt to access beyond end of device [ 2861.646793] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2861.651571] loop1: rw=1, want=4625, limit=112 [ 2861.664960] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2861.672056] attempt to access beyond end of device [ 2861.678397] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2861.678587] loop1: rw=1, want=8721, limit=112 [ 2861.697225] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2861.698552] attempt to access beyond end of device [ 2861.711745] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2861.712064] loop1: rw=1, want=12817, limit=112 [ 2861.746191] attempt to access beyond end of device [ 2861.746916] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2861.754974] loop1: rw=1, want=16913, limit=112 [ 2861.835791] attempt to access beyond end of device 09:27:03 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000004000e000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:03 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) [ 2861.869902] loop1: rw=1, want=21009, limit=112 09:27:03 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0xf00) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:03 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\r', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2861.938687] attempt to access beyond end of device [ 2861.943634] loop1: rw=1, want=25105, limit=112 [ 2861.964415] attempt to access beyond end of device [ 2861.969487] loop1: rw=1, want=29201, limit=112 [ 2861.980233] attempt to access beyond end of device [ 2861.985180] loop1: rw=1, want=32993, limit=112 [ 2862.005988] XFS (loop0): Mounting V4 Filesystem [ 2862.011703] XFS (loop0): Log size 33555290 blocks too large, maximum size is 1048576 blocks [ 2862.028528] XFS (loop0): Log size out of supported range. [ 2862.034155] XFS (loop0): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 2862.074438] XFS (loop0): totally zeroed log [ 2862.083104] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2862.099144] XFS (loop0): Unmount and run xfs_repair [ 2862.104258] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2862.130381] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2862.141112] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2862.153433] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2862.163872] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2862.254813] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2862.312856] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2862.353584] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2862.389015] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2862.442346] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2862.474391] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2862.500524] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2862.527411] XFS (loop2): Mounting V4 Filesystem [ 2862.533224] XFS (loop2): totally zeroed log [ 2862.545856] XFS (loop2): Failed to read root inode 0xe000000000d88, error 22 09:27:05 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:27:05 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x02', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:05 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000300035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:05 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000042010000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:05 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x1300) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:05 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000100035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2863.468930] attempt to access beyond end of device [ 2863.473909] loop1: rw=1, want=130, limit=112 [ 2863.478568] buffer_io_error: 38 callbacks suppressed [ 2863.478577] Buffer I/O error on dev loop1, logical block 129, lost async page write [ 2863.483888] attempt to access beyond end of device [ 2863.501349] loop1: rw=1, want=131, limit=112 [ 2863.518454] Buffer I/O error on dev loop1, logical block 130, lost async page write [ 2863.526984] attempt to access beyond end of device [ 2863.532172] loop1: rw=1, want=132, limit=112 [ 2863.537444] Buffer I/O error on dev loop1, logical block 131, lost async page write [ 2863.552739] attempt to access beyond end of device [ 2863.587648] loop1: rw=1, want=133, limit=112 [ 2863.609958] Buffer I/O error on dev loop1, logical block 132, lost async page write [ 2863.620763] attempt to access beyond end of device [ 2863.629020] loop1: rw=1, want=142, limit=112 [ 2863.642957] Buffer I/O error on dev loop1, logical block 141, lost async page write 09:27:05 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x2000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2863.659685] attempt to access beyond end of device [ 2863.670391] loop1: rw=1, want=143, limit=112 [ 2863.675209] Buffer I/O error on dev loop1, logical block 142, lost async page write [ 2863.687609] attempt to access beyond end of device [ 2863.692965] XFS (loop2): Mounting V4 Filesystem [ 2863.699044] XFS (loop2): totally zeroed log [ 2863.704661] XFS (loop2): Failed to read root inode 0x2010000000000d88, error 22 [ 2863.704795] loop1: rw=1, want=144, limit=112 [ 2863.718681] XFS (loop5): Mounting V4 Filesystem [ 2863.724059] XFS (loop5): Log size 16778074 blocks too large, maximum size is 1048576 blocks [ 2863.724228] XFS (loop0): Mounting V4 Filesystem [ 2863.747958] Buffer I/O error on dev loop1, logical block 143, lost async page write [ 2863.769914] XFS (loop0): Log size 50332506 blocks too large, maximum size is 1048576 blocks [ 2863.774892] XFS (loop5): Log size out of supported range. [ 2863.784465] attempt to access beyond end of device [ 2863.790180] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 2863.802564] loop1: rw=1, want=145, limit=112 [ 2863.807471] Buffer I/O error on dev loop1, logical block 144, lost async page write 09:27:05 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2863.812929] XFS (loop0): Log size out of supported range. [ 2863.817065] attempt to access beyond end of device [ 2863.830484] loop1: rw=1, want=921, limit=112 [ 2863.835322] XFS (loop5): totally zeroed log [ 2863.840799] XFS (loop5): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2863.849027] XFS (loop0): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 2863.869807] XFS (loop0): totally zeroed log [ 2863.874155] attempt to access beyond end of device [ 2863.874168] loop1: rw=1, want=950, limit=112 [ 2863.874185] Buffer I/O error on dev loop1, logical block 949, lost async page write [ 2863.924011] XFS (loop5): Unmount and run xfs_repair [ 2863.931329] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 2863.949993] attempt to access beyond end of device [ 2863.961215] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 09:27:05 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040020000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2863.969764] loop1: rw=1, want=951, limit=112 [ 2863.982164] Buffer I/O error on dev loop1, logical block 950, lost async page write [ 2863.984631] XFS (loop0): Unmount and run xfs_repair [ 2863.990343] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2863.999373] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2864.014927] attempt to access beyond end of device [ 2864.025802] loop1: rw=1, want=952, limit=112 [ 2864.027425] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2864.038679] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2864.059781] attempt to access beyond end of device [ 2864.070511] loop1: rw=1, want=953, limit=112 [ 2864.077404] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2864.086877] attempt to access beyond end of device [ 2864.096534] loop1: rw=1, want=974, limit=112 [ 2864.109094] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2864.123031] attempt to access beyond end of device [ 2864.135056] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2864.146392] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2864.150217] loop1: rw=1, want=975, limit=112 [ 2864.174212] attempt to access beyond end of device [ 2864.184191] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2864.186332] loop1: rw=1, want=976, limit=112 [ 2864.198622] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2864.213111] XFS (loop4): Mounting V4 Filesystem [ 2864.215201] attempt to access beyond end of device [ 2864.222247] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2864.226523] loop1: rw=1, want=977, limit=112 [ 2864.234979] XFS (loop4): totally zeroed log [ 2864.241903] attempt to access beyond end of device [ 2864.244114] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2864.255173] loop1: rw=1, want=1026, limit=112 [ 2864.267318] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2864.274923] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2864.286659] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2864.299438] attempt to access beyond end of device [ 2864.305853] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2864.324854] loop1: rw=1, want=1027, limit=112 [ 2864.327617] XFS (loop5): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2864.340639] XFS (loop2): Mounting V4 Filesystem [ 2864.347687] attempt to access beyond end of device [ 2864.352401] XFS (loop2): totally zeroed log [ 2864.365245] loop1: rw=1, want=1028, limit=112 [ 2864.370482] XFS (loop2): Failed to read root inode 0x20000000000d88, error 22 [ 2864.378685] XFS (loop5): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2864.383253] attempt to access beyond end of device [ 2864.400561] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2864.420494] XFS (loop5): Failed to read root inode 0xd88, error 117 [ 2864.431737] loop1: rw=1, want=1029, limit=112 [ 2864.439187] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2864.447920] attempt to access beyond end of device [ 2864.457724] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2864.467630] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2864.469445] loop1: rw=1, want=1038, limit=112 [ 2864.476580] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2864.491800] attempt to access beyond end of device [ 2864.511606] loop1: rw=1, want=1039, limit=112 [ 2864.516737] attempt to access beyond end of device [ 2864.523137] loop1: rw=1, want=1040, limit=112 [ 2864.528379] attempt to access beyond end of device [ 2864.533572] loop1: rw=1, want=1041, limit=112 09:27:06 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2864.545664] attempt to access beyond end of device [ 2864.560600] loop1: rw=1, want=5137, limit=112 09:27:06 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000400035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2864.614731] attempt to access beyond end of device [ 2864.624959] loop1: rw=1, want=9233, limit=112 [ 2864.642556] attempt to access beyond end of device 09:27:06 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x03', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2864.661934] loop1: rw=1, want=13329, limit=112 [ 2864.694388] attempt to access beyond end of device [ 2864.704510] loop1: rw=1, want=15025, limit=112 [ 2864.841286] XFS (loop0): Mounting V4 Filesystem [ 2864.850345] XFS (loop0): Log size 67109722 blocks too large, maximum size is 1048576 blocks [ 2864.873651] XFS (loop0): Log size out of supported range. [ 2864.895367] XFS (loop0): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 2864.942091] XFS (loop0): totally zeroed log [ 2864.955047] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2864.982136] XFS (loop5): Mounting V4 Filesystem [ 2865.001046] XFS (loop0): Unmount and run xfs_repair [ 2865.009313] XFS (loop5): totally zeroed log [ 2865.026770] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2865.034459] XFS (loop5): Failed to read root inode 0x189a000000000d88, error 22 [ 2865.054799] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2865.081028] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2865.114261] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2865.142691] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2865.171411] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2865.201041] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2865.215212] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2865.229885] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2865.254504] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2865.290488] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2865.305793] XFS (loop0): Failed to read root inode 0xd88, error 117 09:27:07 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:27:07 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000041020000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:07 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x3f00) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:07 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x03', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:07 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x300000000000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:07 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000500035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2866.021404] attempt to access beyond end of device [ 2866.032227] loop1: rw=1, want=130, limit=112 [ 2866.040598] attempt to access beyond end of device [ 2866.045674] loop1: rw=1, want=131, limit=112 [ 2866.050782] attempt to access beyond end of device [ 2866.060002] loop1: rw=1, want=132, limit=112 [ 2866.064640] attempt to access beyond end of device [ 2866.075855] loop1: rw=1, want=133, limit=112 [ 2866.080980] attempt to access beyond end of device [ 2866.089679] XFS (loop0): Mounting V4 Filesystem [ 2866.115459] loop1: rw=1, want=142, limit=112 [ 2866.129448] attempt to access beyond end of device [ 2866.136841] XFS (loop0): Log size 83886938 blocks too large, maximum size is 1048576 blocks [ 2866.174144] XFS (loop0): Log size out of supported range. [ 2866.185475] loop1: rw=1, want=143, limit=112 [ 2866.200805] attempt to access beyond end of device 09:27:07 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x300000000000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:07 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2866.219635] XFS (loop0): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 2866.234475] XFS (loop2): Mounting V4 Filesystem [ 2866.262182] loop1: rw=1, want=144, limit=112 [ 2866.267884] XFS (loop2): totally zeroed log 09:27:08 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x4000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2866.287661] attempt to access beyond end of device [ 2866.295794] XFS (loop2): Failed to read root inode 0x1020000000000d88, error 22 [ 2866.301384] loop1: rw=1, want=145, limit=112 [ 2866.305417] XFS (loop0): totally zeroed log [ 2866.312911] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2866.316588] attempt to access beyond end of device [ 2866.335659] loop1: rw=1, want=3545, limit=112 [ 2866.344673] attempt to access beyond end of device [ 2866.350187] loop1: rw=1, want=3574, limit=112 [ 2866.354856] attempt to access beyond end of device [ 2866.360365] loop1: rw=1, want=3575, limit=112 [ 2866.368658] attempt to access beyond end of device [ 2866.371722] XFS (loop0): Unmount and run xfs_repair [ 2866.373745] loop1: rw=1, want=3576, limit=112 [ 2866.379492] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2866.383603] attempt to access beyond end of device [ 2866.395182] loop1: rw=1, want=3577, limit=112 [ 2866.395820] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2866.417440] attempt to access beyond end of device [ 2866.422471] loop1: rw=1, want=3598, limit=112 [ 2866.427313] attempt to access beyond end of device [ 2866.435743] loop1: rw=1, want=3599, limit=112 [ 2866.438505] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2866.440402] attempt to access beyond end of device [ 2866.453239] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2866.453481] loop1: rw=1, want=3600, limit=112 [ 2866.463996] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2866.474758] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2866.480331] attempt to access beyond end of device [ 2866.483127] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2866.488408] loop1: rw=1, want=3601, limit=112 [ 2866.502407] attempt to access beyond end of device [ 2866.505076] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2866.507963] loop1: rw=1, want=3650, limit=112 [ 2866.517864] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2866.520724] attempt to access beyond end of device [ 2866.533870] loop1: rw=1, want=3651, limit=112 [ 2866.534364] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2866.543333] attempt to access beyond end of device [ 2866.553389] loop1: rw=1, want=3652, limit=112 [ 2866.558526] attempt to access beyond end of device [ 2866.562048] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2866.563647] loop1: rw=1, want=3653, limit=112 [ 2866.572147] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2866.577977] attempt to access beyond end of device [ 2866.634959] loop1: rw=1, want=3662, limit=112 [ 2866.639849] attempt to access beyond end of device [ 2866.647435] loop1: rw=1, want=3663, limit=112 [ 2866.662720] attempt to access beyond end of device [ 2866.673287] loop1: rw=1, want=3664, limit=112 [ 2866.678515] attempt to access beyond end of device [ 2866.693590] loop1: rw=1, want=3665, limit=112 [ 2866.724944] attempt to access beyond end of device [ 2866.751281] loop1: rw=1, want=7761, limit=112 [ 2866.819229] attempt to access beyond end of device [ 2866.834633] loop1: rw=1, want=11857, limit=112 09:27:08 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000004003f000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2866.867164] XFS (loop4): Mounting V4 Filesystem [ 2866.875048] attempt to access beyond end of device [ 2866.880646] loop1: rw=1, want=15953, limit=112 [ 2866.905920] attempt to access beyond end of device [ 2866.911102] loop1: rw=1, want=20049, limit=112 09:27:08 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000600035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2866.912154] XFS (loop4): totally zeroed log [ 2866.929888] attempt to access beyond end of device [ 2866.940642] loop1: rw=1, want=24145, limit=112 [ 2866.945873] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 09:27:08 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x6000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2866.982946] attempt to access beyond end of device [ 2866.990706] loop1: rw=1, want=28241, limit=112 [ 2867.016214] attempt to access beyond end of device [ 2867.021859] loop1: rw=1, want=32337, limit=112 [ 2867.031005] attempt to access beyond end of device [ 2867.036068] loop1: rw=1, want=32993, limit=112 [ 2867.268958] XFS (loop2): Mounting V4 Filesystem [ 2867.292794] XFS (loop2): totally zeroed log [ 2867.300257] XFS (loop0): Mounting V4 Filesystem [ 2867.326660] XFS (loop2): Failed to read root inode 0x3f000000000d88, error 22 [ 2867.330802] XFS (loop0): Log size 100664154 blocks too large, maximum size is 1048576 blocks [ 2867.375274] XFS (loop0): Log size out of supported range. [ 2867.386927] XFS (loop0): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 2867.439289] XFS (loop0): totally zeroed log [ 2867.449436] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2867.468348] XFS (loop0): Unmount and run xfs_repair [ 2867.481326] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2867.493674] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2867.505203] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2867.532328] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2867.550885] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2867.561658] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2867.574187] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2867.585015] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2867.599754] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2867.610326] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2867.636169] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2867.660827] XFS (loop0): Failed to read root inode 0xd88, error 117 09:27:10 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:27:10 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x01', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:10 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000041020000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:10 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040040000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:10 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000800035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x8004) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2868.690882] attempt to access beyond end of device [ 2868.696049] loop1: rw=1, want=130, limit=112 [ 2868.700791] buffer_io_error: 38 callbacks suppressed [ 2868.700801] Buffer I/O error on dev loop1, logical block 129, lost async page write [ 2868.714195] attempt to access beyond end of device [ 2868.719464] loop1: rw=1, want=131, limit=112 [ 2868.725497] Buffer I/O error on dev loop1, logical block 130, lost async page write [ 2868.733889] attempt to access beyond end of device [ 2868.739234] loop1: rw=1, want=132, limit=112 [ 2868.743891] Buffer I/O error on dev loop1, logical block 131, lost async page write [ 2868.753948] attempt to access beyond end of device [ 2868.759268] loop1: rw=1, want=133, limit=112 [ 2868.763919] Buffer I/O error on dev loop1, logical block 132, lost async page write [ 2868.772238] attempt to access beyond end of device [ 2868.778307] loop1: rw=1, want=142, limit=112 [ 2868.786541] Buffer I/O error on dev loop1, logical block 141, lost async page write [ 2868.821601] attempt to access beyond end of device [ 2868.852772] loop1: rw=1, want=143, limit=112 [ 2868.890956] Buffer I/O error on dev loop1, logical block 142, lost async page write [ 2868.901267] attempt to access beyond end of device [ 2868.907436] loop1: rw=1, want=144, limit=112 [ 2868.920627] Buffer I/O error on dev loop1, logical block 143, lost async page write [ 2868.928698] attempt to access beyond end of device [ 2868.933760] loop1: rw=1, want=145, limit=112 [ 2868.938479] Buffer I/O error on dev loop1, logical block 144, lost async page write [ 2868.954223] attempt to access beyond end of device [ 2868.960930] loop1: rw=1, want=4241, limit=112 [ 2868.968667] XFS (loop0): Mounting V4 Filesystem [ 2868.974066] XFS (loop5): Mounting V4 Filesystem 09:27:10 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x02', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2868.983889] XFS (loop0): Log size 134218586 blocks too large, maximum size is 1048576 blocks [ 2869.000149] XFS (loop2): Mounting V4 Filesystem [ 2869.005182] attempt to access beyond end of device [ 2869.006460] XFS (loop0): Log size out of supported range. [ 2869.013857] XFS (loop5): totally zeroed log [ 2869.015897] XFS (loop0): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 2869.023892] loop1: rw=1, want=8337, limit=112 [ 2869.040351] XFS (loop2): totally zeroed log [ 2869.046737] XFS (loop0): totally zeroed log [ 2869.049689] XFS (loop5): Failed to read root inode 0x1020000000000d88, error 22 [ 2869.059766] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2869.064981] attempt to access beyond end of device [ 2869.080846] XFS (loop2): Failed to read root inode 0x40000000000d88, error 22 09:27:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0xf000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2869.090252] loop1: rw=1, want=8537, limit=112 [ 2869.095444] attempt to access beyond end of device [ 2869.099222] XFS (loop0): Unmount and run xfs_repair [ 2869.105943] loop1: rw=1, want=8566, limit=112 [ 2869.110388] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2869.112932] Buffer I/O error on dev loop1, logical block 8565, lost async page write [ 2869.144388] attempt to access beyond end of device [ 2869.172523] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2869.195862] loop1: rw=1, want=8567, limit=112 [ 2869.204562] Buffer I/O error on dev loop1, logical block 8566, lost async page write 09:27:10 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000004800000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2869.220050] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2869.233445] attempt to access beyond end of device [ 2869.242448] loop1: rw=1, want=8568, limit=112 [ 2869.249428] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2869.304326] attempt to access beyond end of device [ 2869.311058] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2869.323431] loop1: rw=1, want=8569, limit=112 [ 2869.326797] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2869.334193] attempt to access beyond end of device [ 2869.336734] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2869.347010] loop1: rw=1, want=8590, limit=112 [ 2869.354134] attempt to access beyond end of device [ 2869.359323] loop1: rw=1, want=8591, limit=112 [ 2869.364508] attempt to access beyond end of device [ 2869.365246] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2869.370000] loop1: rw=1, want=8592, limit=112 [ 2869.382932] attempt to access beyond end of device [ 2869.424181] loop1: rw=1, want=8593, limit=112 09:27:11 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x03', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:11 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000004c0ed000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2869.453196] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2869.465946] attempt to access beyond end of device [ 2869.511575] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2869.517292] loop1: rw=1, want=8642, limit=112 09:27:11 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0xf700) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2869.559958] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2869.564787] attempt to access beyond end of device [ 2869.578609] loop1: rw=1, want=8643, limit=112 [ 2869.593788] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2869.610919] attempt to access beyond end of device [ 2869.623843] loop1: rw=1, want=8644, limit=112 [ 2869.635508] attempt to access beyond end of device [ 2869.643809] loop1: rw=1, want=8645, limit=112 [ 2869.662112] attempt to access beyond end of device [ 2869.662567] XFS (loop5): Mounting V4 Filesystem [ 2869.669295] loop1: rw=1, want=8654, limit=112 [ 2869.680701] attempt to access beyond end of device [ 2869.689637] XFS (loop5): totally zeroed log [ 2869.693032] loop1: rw=1, want=8655, limit=112 [ 2869.699229] XFS (loop5): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2869.709609] XFS (loop5): Unmount and run xfs_repair [ 2869.715496] attempt to access beyond end of device [ 2869.723372] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 2869.729986] loop1: rw=1, want=8656, limit=112 [ 2869.730756] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2869.734779] attempt to access beyond end of device [ 2869.743269] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2869.753504] loop1: rw=1, want=8657, limit=112 [ 2869.756444] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2869.767564] attempt to access beyond end of device [ 2869.773984] loop1: rw=1, want=12753, limit=112 [ 2869.775308] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2869.787510] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2869.795845] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2869.804544] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2869.810646] attempt to access beyond end of device [ 2869.818754] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2869.823766] loop1: rw=1, want=16849, limit=112 [ 2869.839184] XFS (loop5): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2869.871620] attempt to access beyond end of device [ 2869.890552] loop1: rw=1, want=20945, limit=112 [ 2869.926458] XFS (loop5): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2869.977533] attempt to access beyond end of device [ 2869.991760] XFS (loop5): Failed to read root inode 0xd88, error 117 [ 2869.999723] XFS (loop2): Mounting V4 Filesystem [ 2870.002897] loop1: rw=1, want=25041, limit=112 [ 2870.018016] XFS (loop2): totally zeroed log [ 2870.023875] attempt to access beyond end of device [ 2870.030921] loop1: rw=1, want=29137, limit=112 [ 2870.042425] XFS (loop2): Failed to read root inode 0xc0ed000000000d88, error 22 [ 2870.050032] attempt to access beyond end of device [ 2870.050044] loop1: rw=1, want=32993, limit=112 09:27:12 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:27:12 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000800800035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:12 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x01', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:12 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x100000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:12 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:12 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040fff000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2871.074321] attempt to access beyond end of device [ 2871.079604] loop1: rw=1, want=130, limit=112 [ 2871.090427] attempt to access beyond end of device [ 2871.095525] loop1: rw=1, want=131, limit=112 [ 2871.100243] attempt to access beyond end of device [ 2871.105311] loop1: rw=1, want=132, limit=112 [ 2871.109955] attempt to access beyond end of device [ 2871.117762] loop1: rw=1, want=133, limit=112 [ 2871.122255] attempt to access beyond end of device [ 2871.129288] loop1: rw=1, want=142, limit=112 [ 2871.133816] attempt to access beyond end of device [ 2871.139728] loop1: rw=1, want=143, limit=112 [ 2871.144568] attempt to access beyond end of device [ 2871.166635] loop1: rw=1, want=144, limit=112 [ 2871.192919] attempt to access beyond end of device [ 2871.235781] loop1: rw=1, want=145, limit=112 [ 2871.248910] XFS (loop0): Mounting V4 Filesystem [ 2871.255655] XFS (loop0): Log size 134218586 blocks too large, maximum size is 1048576 blocks [ 2871.265629] attempt to access beyond end of device [ 2871.271184] loop1: rw=1, want=4241, limit=112 [ 2871.278012] XFS (loop0): Log size out of supported range. [ 2871.285043] XFS (loop2): Mounting V4 Filesystem [ 2871.291972] XFS (loop5): Mounting V4 Filesystem [ 2871.297921] attempt to access beyond end of device [ 2871.316666] XFS (loop0): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 2871.339561] loop1: rw=1, want=4249, limit=112 [ 2871.345326] XFS (loop2): totally zeroed log [ 2871.351147] XFS (loop5): totally zeroed log [ 2871.355905] XFS (loop5): Failed to read root inode 0x189a000000000d88, error 22 [ 2871.360780] attempt to access beyond end of device [ 2871.369225] XFS (loop2): Failed to read root inode 0xfff000000000d88, error 22 [ 2871.377668] loop1: rw=1, want=4278, limit=112 [ 2871.381668] XFS (loop0): totally zeroed log [ 2871.389489] attempt to access beyond end of device [ 2871.395497] loop1: rw=1, want=4279, limit=112 [ 2871.395595] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2871.405736] attempt to access beyond end of device [ 2871.417191] XFS (loop0): Unmount and run xfs_repair [ 2871.424580] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2871.438527] loop1: rw=1, want=4280, limit=112 [ 2871.451323] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2871.458815] attempt to access beyond end of device [ 2871.469857] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2871.480837] loop1: rw=1, want=4281, limit=112 09:27:13 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x02', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2871.488245] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2871.492320] attempt to access beyond end of device [ 2871.503271] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2871.504890] loop1: rw=1, want=4302, limit=112 [ 2871.516074] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2871.522406] attempt to access beyond end of device [ 2871.529642] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2871.530049] loop1: rw=1, want=4303, limit=112 [ 2871.542499] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2871.542510] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2871.557015] attempt to access beyond end of device [ 2871.564267] loop1: rw=1, want=4304, limit=112 [ 2871.569166] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2871.585020] attempt to access beyond end of device [ 2871.590560] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2871.599954] loop1: rw=1, want=4305, limit=112 [ 2871.604728] attempt to access beyond end of device [ 2871.617821] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2871.624661] loop1: rw=1, want=4354, limit=112 [ 2871.630281] attempt to access beyond end of device [ 2871.635504] loop1: rw=1, want=4355, limit=112 [ 2871.642640] attempt to access beyond end of device [ 2871.649319] loop1: rw=1, want=4356, limit=112 [ 2871.654636] attempt to access beyond end of device [ 2871.687700] loop1: rw=1, want=4357, limit=112 [ 2871.700432] attempt to access beyond end of device [ 2871.712764] loop1: rw=1, want=4366, limit=112 [ 2871.730440] attempt to access beyond end of device 09:27:13 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2871.753229] loop1: rw=1, want=4367, limit=112 [ 2871.772389] attempt to access beyond end of device [ 2871.800855] loop1: rw=1, want=4368, limit=112 [ 2871.814048] attempt to access beyond end of device 09:27:13 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000040000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:13 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000010a00035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2871.851337] loop1: rw=1, want=4369, limit=112 [ 2871.895785] attempt to access beyond end of device [ 2871.905426] loop1: rw=1, want=8465, limit=112 [ 2871.930260] attempt to access beyond end of device [ 2871.935351] loop1: rw=1, want=12561, limit=112 [ 2871.949827] attempt to access beyond end of device [ 2871.954984] loop1: rw=1, want=16657, limit=112 [ 2871.971780] attempt to access beyond end of device [ 2871.976942] loop1: rw=1, want=20753, limit=112 [ 2871.991298] attempt to access beyond end of device [ 2871.996402] loop1: rw=1, want=24849, limit=112 [ 2872.050011] attempt to access beyond end of device [ 2872.091386] loop1: rw=1, want=28945, limit=112 09:27:13 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x200000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:13 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2872.141567] attempt to access beyond end of device [ 2872.154128] loop1: rw=1, want=32993, limit=112 [ 2872.178521] XFS (loop5): Mounting V4 Filesystem [ 2872.187634] XFS (loop5): totally zeroed log [ 2872.192486] XFS (loop5): Failed to read root inode 0x189a000000000d88, error 22 [ 2872.275838] XFS (loop2): Mounting V4 Filesystem [ 2872.313294] XFS (loop2): totally zeroed log [ 2872.331324] XFS (loop2): Failed to read root inode 0x40000000d88, error 22 [ 2872.341413] XFS (loop0): Mounting V4 Filesystem [ 2872.349074] XFS (loop0): Log size 167773018 blocks too large, maximum size is 1048576 blocks [ 2872.376643] XFS (loop0): Log size out of supported range. [ 2872.385312] XFS (loop0): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 2872.428789] XFS (loop0): totally zeroed log [ 2872.434966] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2872.500629] XFS (loop0): Unmount and run xfs_repair [ 2872.516442] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2872.528918] XFS (loop4): Mounting V4 Filesystem [ 2872.545375] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2872.586485] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2872.586679] XFS (loop4): totally zeroed log [ 2872.645898] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2872.659017] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2872.695704] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2872.711792] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2872.744741] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2872.775520] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2872.785872] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2872.815804] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2872.858562] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2872.873327] XFS (loop0): Failed to read root inode 0xd88, error 117 09:27:15 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:27:15 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0xf0ffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:15 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:15 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c19000000000000000400000e0000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:15 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000001000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:15 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x400000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2873.817553] attempt to access beyond end of device [ 2873.836359] loop1: rw=1, want=130, limit=112 [ 2873.849208] buffer_io_error: 38 callbacks suppressed [ 2873.849219] Buffer I/O error on dev loop1, logical block 129, lost async page write [ 2873.862520] attempt to access beyond end of device [ 2873.867667] loop1: rw=1, want=131, limit=112 [ 2873.872213] Buffer I/O error on dev loop1, logical block 130, lost async page write [ 2873.881207] attempt to access beyond end of device [ 2873.886381] loop1: rw=1, want=132, limit=112 [ 2873.890989] Buffer I/O error on dev loop1, logical block 131, lost async page write [ 2873.899157] attempt to access beyond end of device [ 2873.904295] loop1: rw=1, want=133, limit=112 [ 2873.908998] Buffer I/O error on dev loop1, logical block 132, lost async page write [ 2873.925262] attempt to access beyond end of device [ 2873.948958] loop1: rw=1, want=142, limit=112 [ 2873.956908] Buffer I/O error on dev loop1, logical block 141, lost async page write [ 2874.006492] attempt to access beyond end of device [ 2874.024248] loop1: rw=1, want=143, limit=112 [ 2874.048031] Buffer I/O error on dev loop1, logical block 142, lost async page write [ 2874.077215] attempt to access beyond end of device [ 2874.084208] XFS (loop0): Mounting V4 Filesystem [ 2874.097516] XFS (loop4): Mounting V4 Filesystem [ 2874.100509] XFS (loop0): Log size 268436314 blocks too large, maximum size is 1048576 blocks [ 2874.102432] XFS (loop2): Mounting V4 Filesystem [ 2874.117203] loop1: rw=1, want=144, limit=112 [ 2874.125916] Buffer I/O error on dev loop1, logical block 143, lost async page write [ 2874.129191] XFS (loop0): Log size out of supported range. [ 2874.139806] XFS (loop4): totally zeroed log 09:27:15 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:27:15 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x600000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2874.141496] attempt to access beyond end of device [ 2874.153805] XFS (loop2): totally zeroed log [ 2874.159058] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2874.159161] XFS (loop2): Failed to read root inode 0xe0000000d88, error 22 [ 2874.173203] loop1: rw=1, want=145, limit=112 [ 2874.173860] XFS (loop0): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 2874.179713] Buffer I/O error on dev loop1, logical block 144, lost async page write [ 2874.190823] XFS (loop0): Invalid block length (0x1) for buffer [ 2874.204335] XFS (loop0): empty log check failed [ 2874.232495] XFS (loop0): log mount/recovery failed: error -12 [ 2874.234008] attempt to access beyond end of device [ 2874.250105] loop1: rw=1, want=4241, limit=112 [ 2874.253745] XFS (loop0): log mount failed [ 2874.258252] attempt to access beyond end of device [ 2874.264399] loop1: rw=1, want=4313, limit=112 [ 2874.272674] attempt to access beyond end of device [ 2874.279456] loop1: rw=1, want=4342, limit=112 [ 2874.284153] Buffer I/O error on dev loop1, logical block 4341, lost async page write [ 2874.292567] attempt to access beyond end of device [ 2874.298322] loop1: rw=1, want=4343, limit=112 [ 2874.302840] Buffer I/O error on dev loop1, logical block 4342, lost async page write [ 2874.316770] attempt to access beyond end of device [ 2874.323068] loop1: rw=1, want=4344, limit=112 [ 2874.332418] attempt to access beyond end of device [ 2874.339116] loop1: rw=1, want=4345, limit=112 [ 2874.343664] attempt to access beyond end of device [ 2874.348957] loop1: rw=1, want=4366, limit=112 [ 2874.353486] attempt to access beyond end of device [ 2874.358500] loop1: rw=1, want=4367, limit=112 [ 2874.363024] attempt to access beyond end of device [ 2874.368082] loop1: rw=1, want=4368, limit=112 [ 2874.372628] attempt to access beyond end of device [ 2874.372641] loop1: rw=1, want=4369, limit=112 [ 2874.372711] attempt to access beyond end of device [ 2874.387385] loop1: rw=1, want=4418, limit=112 [ 2874.392247] attempt to access beyond end of device [ 2874.397754] loop1: rw=1, want=4419, limit=112 [ 2874.402786] attempt to access beyond end of device [ 2874.408060] loop1: rw=1, want=4420, limit=112 [ 2874.412721] attempt to access beyond end of device [ 2874.417947] loop1: rw=1, want=4421, limit=112 [ 2874.422591] attempt to access beyond end of device [ 2874.428757] loop1: rw=1, want=4430, limit=112 [ 2874.442004] attempt to access beyond end of device [ 2874.448871] loop1: rw=1, want=4431, limit=112 [ 2874.453711] attempt to access beyond end of device [ 2874.483861] loop1: rw=1, want=4432, limit=112 [ 2874.497643] attempt to access beyond end of device [ 2874.524816] loop1: rw=1, want=4433, limit=112 09:27:16 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000046b6b6b0000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2874.561581] attempt to access beyond end of device [ 2874.579768] loop1: rw=1, want=8529, limit=112 09:27:16 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x1a', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2874.610135] attempt to access beyond end of device [ 2874.623274] loop1: rw=1, want=12625, limit=112 09:27:16 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000011c00035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2874.660585] attempt to access beyond end of device 09:27:16 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x6b6b6b) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2874.706716] loop1: rw=1, want=16721, limit=112 [ 2874.769572] attempt to access beyond end of device [ 2874.774650] loop1: rw=1, want=20817, limit=112 [ 2874.787736] attempt to access beyond end of device [ 2874.792673] loop1: rw=1, want=24913, limit=112 [ 2874.805705] attempt to access beyond end of device [ 2874.820165] loop1: rw=1, want=29009, limit=112 [ 2874.833484] attempt to access beyond end of device [ 2874.843410] loop1: rw=1, want=32993, limit=112 [ 2875.044509] XFS (loop2): Mounting V4 Filesystem [ 2875.046635] XFS (loop0): Mounting V4 Filesystem [ 2875.056908] XFS (loop2): totally zeroed log [ 2875.078729] XFS (loop2): Failed to read root inode 0x6b6b6b0000000d88, error 22 [ 2875.087310] XFS (loop0): Log size 469762906 blocks too large, maximum size is 1048576 blocks [ 2875.087322] XFS (loop0): Log size out of supported range. [ 2875.087333] XFS (loop0): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 2875.141242] XFS (loop0): Invalid block length (0x1) for buffer [ 2875.149858] XFS (loop0): empty log check failed [ 2875.174256] XFS (loop0): log mount/recovery failed: error -12 [ 2875.209869] XFS (loop0): log mount failed 09:27:17 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:27:17 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x02', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x80ffff) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:17 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a0000000100001000000000010000011c0000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:17 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000003f00035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:17 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000100000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2876.257817] attempt to access beyond end of device [ 2876.262917] loop1: rw=1, want=130, limit=112 [ 2876.275646] attempt to access beyond end of device [ 2876.301282] loop1: rw=1, want=131, limit=112 [ 2876.307193] attempt to access beyond end of device [ 2876.312485] loop1: rw=1, want=132, limit=112 [ 2876.320818] attempt to access beyond end of device [ 2876.326034] loop1: rw=1, want=133, limit=112 [ 2876.344587] attempt to access beyond end of device [ 2876.371967] XFS (loop5): Mounting V4 Filesystem [ 2876.397441] loop1: rw=1, want=142, limit=112 [ 2876.405974] XFS (loop5): totally zeroed log [ 2876.415671] XFS (loop0): Mounting V4 Filesystem [ 2876.425264] XFS (loop0): Log size 1056965466 blocks too large, maximum size is 1048576 blocks [ 2876.433407] attempt to access beyond end of device 09:27:18 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x03', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2876.443533] XFS (loop5): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2876.463993] loop1: rw=1, want=143, limit=112 [ 2876.464014] XFS (loop0): Log size out of supported range. [ 2876.474285] XFS (loop5): Unmount and run xfs_repair [ 2876.480416] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 2876.487696] XFS (loop0): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 2876.491903] attempt to access beyond end of device [ 2876.499673] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2876.513355] XFS (loop0): Invalid block length (0x1) for buffer [ 2876.519016] loop1: rw=1, want=144, limit=112 [ 2876.526221] XFS (loop0): empty log check failed [ 2876.531159] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2876.539484] XFS (loop0): log mount/recovery failed: error -12 [ 2876.545550] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2876.554637] XFS (loop0): log mount failed [ 2876.564995] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2876.574813] XFS (loop2): Mounting V4 Filesystem [ 2876.591535] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2876.594754] attempt to access beyond end of device [ 2876.605739] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2876.612587] XFS (loop2): totally zeroed log [ 2876.635056] loop1: rw=1, want=145, limit=112 [ 2876.639871] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2876.652004] attempt to access beyond end of device [ 2876.657464] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2876.666038] loop1: rw=1, want=2457, limit=112 [ 2876.671085] XFS (loop5): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2876.673887] XFS (loop2): Failed to read root inode 0x100000d88, error 22 [ 2876.689542] attempt to access beyond end of device [ 2876.695241] loop1: rw=1, want=2486, limit=112 09:27:18 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a00000001000010000000000100006b6b6b00035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2876.717123] XFS (loop5): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2876.725523] attempt to access beyond end of device [ 2876.744109] loop1: rw=1, want=2487, limit=112 [ 2876.757765] attempt to access beyond end of device 09:27:18 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x02', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2876.779584] XFS (loop5): Failed to read root inode 0xd88, error 117 [ 2876.794170] loop1: rw=1, want=2488, limit=112 [ 2876.804709] attempt to access beyond end of device [ 2876.812330] loop1: rw=1, want=2489, limit=112 [ 2876.817446] attempt to access beyond end of device [ 2876.822497] loop1: rw=1, want=2510, limit=112 [ 2876.827534] attempt to access beyond end of device [ 2876.832622] loop1: rw=1, want=2511, limit=112 [ 2876.837398] attempt to access beyond end of device [ 2876.842444] loop1: rw=1, want=2512, limit=112 [ 2876.847578] attempt to access beyond end of device [ 2876.852626] loop1: rw=1, want=2513, limit=112 [ 2876.857362] attempt to access beyond end of device [ 2876.863377] loop1: rw=1, want=2562, limit=112 [ 2876.871962] attempt to access beyond end of device [ 2876.877179] loop1: rw=1, want=2563, limit=112 [ 2876.882945] attempt to access beyond end of device [ 2876.888371] loop1: rw=1, want=2564, limit=112 [ 2876.892999] attempt to access beyond end of device [ 2876.910422] loop1: rw=1, want=2565, limit=112 [ 2876.920506] attempt to access beyond end of device [ 2876.926890] loop1: rw=1, want=2574, limit=112 [ 2876.931520] attempt to access beyond end of device [ 2876.943963] loop1: rw=1, want=2575, limit=112 [ 2876.980732] attempt to access beyond end of device 09:27:18 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000011c00035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2877.019963] loop1: rw=1, want=2576, limit=112 [ 2877.031939] attempt to access beyond end of device [ 2877.047142] loop1: rw=1, want=2577, limit=112 09:27:18 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x03', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:18 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000200000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2877.074807] attempt to access beyond end of device [ 2877.092156] loop1: rw=1, want=6673, limit=112 [ 2877.151320] attempt to access beyond end of device [ 2877.169864] loop1: rw=1, want=10769, limit=112 [ 2877.175347] XFS (loop0): Mounting V4 Filesystem [ 2877.199754] XFS (loop0): Log size 1795162970 blocks too large, maximum size is 1048576 blocks [ 2877.217385] XFS (loop0): Log size out of supported range. [ 2877.231685] XFS (loop0): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 2877.270158] attempt to access beyond end of device [ 2877.288007] loop1: rw=1, want=14865, limit=112 [ 2877.332832] XFS (loop0): totally zeroed log [ 2877.343469] attempt to access beyond end of device [ 2877.359412] loop1: rw=1, want=18961, limit=112 [ 2877.364392] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2877.416900] XFS (loop0): Unmount and run xfs_repair [ 2877.423040] XFS (loop5): Mounting V4 Filesystem [ 2877.433052] attempt to access beyond end of device [ 2877.433170] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2877.445579] XFS (loop5): Log size 469762906 blocks too large, maximum size is 1048576 blocks [ 2877.464664] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2877.467104] loop1: rw=1, want=23057, limit=112 [ 2877.486560] XFS (loop5): Log size out of supported range. [ 2877.498689] XFS (loop5): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 2877.515733] attempt to access beyond end of device [ 2877.520078] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2877.533045] loop1: rw=1, want=27153, limit=112 [ 2877.540823] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2877.554887] XFS (loop5): Invalid block length (0x1) for buffer [ 2877.564740] XFS (loop5): empty log check failed [ 2877.570869] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2877.580750] XFS (loop5): log mount/recovery failed: error -12 [ 2877.587239] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2877.597644] XFS (loop5): log mount failed [ 2877.602737] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2877.603426] attempt to access beyond end of device [ 2877.612181] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2877.622825] loop1: rw=1, want=31249, limit=112 [ 2877.624774] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2877.635534] attempt to access beyond end of device [ 2877.653782] loop1: rw=1, want=32993, limit=112 [ 2877.676911] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2877.686238] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2877.701670] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2877.741274] XFS (loop2): Mounting V4 Filesystem [ 2877.762420] XFS (loop2): totally zeroed log [ 2877.778871] XFS (loop2): Failed to read root inode 0x200000d88, error 22 09:27:20 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:27:20 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x01', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:20 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0xc0ffff) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:20 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x80ffff) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:20 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000048000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:20 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000500000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2878.780585] attempt to access beyond end of device [ 2878.785718] loop1: rw=1, want=130, limit=112 [ 2878.790570] attempt to access beyond end of device [ 2878.843202] loop1: rw=1, want=131, limit=112 [ 2878.884912] buffer_io_error: 39 callbacks suppressed [ 2878.884921] Buffer I/O error on dev loop1, logical block 130, lost async page write [ 2878.920925] attempt to access beyond end of device [ 2878.948554] XFS (loop0): Mounting V4 Filesystem [ 2878.953823] XFS (loop0): Log size -2147482790 blocks too large, maximum size is 1048576 blocks [ 2878.979754] XFS (loop2): Mounting V4 Filesystem [ 2878.981208] loop1: rw=1, want=132, limit=112 [ 2878.996463] XFS (loop0): Log size out of supported range. [ 2879.002270] Buffer I/O error on dev loop1, logical block 131, lost async page write [ 2879.003241] XFS (loop2): totally zeroed log [ 2879.010233] XFS (loop0): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 2879.010434] attempt to access beyond end of device [ 2879.031852] XFS (loop0): totally zeroed log [ 2879.036932] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 09:27:20 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2879.051477] XFS (loop2): Failed to read root inode 0x500000d88, error 22 [ 2879.056323] loop1: rw=1, want=133, limit=112 [ 2879.063163] XFS (loop0): Unmount and run xfs_repair [ 2879.068319] Buffer I/O error on dev loop1, logical block 132, lost async page write [ 2879.082588] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2879.092933] attempt to access beyond end of device [ 2879.102509] loop1: rw=1, want=142, limit=112 [ 2879.109063] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2879.122982] Buffer I/O error on dev loop1, logical block 141, lost async page write [ 2879.136390] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2879.141261] attempt to access beyond end of device [ 2879.161315] loop1: rw=1, want=143, limit=112 [ 2879.161915] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2879.173932] Buffer I/O error on dev loop1, logical block 142, lost async page write [ 2879.204555] attempt to access beyond end of device [ 2879.209236] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2879.222213] loop1: rw=1, want=144, limit=112 [ 2879.229514] Buffer I/O error on dev loop1, logical block 143, lost async page write [ 2879.242363] attempt to access beyond end of device 09:27:21 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000700000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2879.274398] loop1: rw=1, want=145, limit=112 [ 2879.279288] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2879.294520] Buffer I/O error on dev loop1, logical block 144, lost async page write [ 2879.321726] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2879.334772] attempt to access beyond end of device [ 2879.359619] loop1: rw=1, want=921, limit=112 [ 2879.362847] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2879.391992] attempt to access beyond end of device [ 2879.400371] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2879.416400] loop1: rw=1, want=950, limit=112 [ 2879.420439] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2879.430260] Buffer I/O error on dev loop1, logical block 949, lost async page write [ 2879.436609] attempt to access beyond end of device [ 2879.450225] loop1: rw=1, want=951, limit=112 [ 2879.458123] XFS (loop4): Mounting V4 Filesystem [ 2879.461085] Buffer I/O error on dev loop1, logical block 950, lost async page write [ 2879.479327] XFS (loop4): totally zeroed log [ 2879.487676] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2879.494635] attempt to access beyond end of device [ 2879.501247] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2879.513775] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2879.521495] loop1: rw=1, want=952, limit=112 [ 2879.530226] Buffer I/O error on dev loop1, logical block 951, lost async page write [ 2879.546058] attempt to access beyond end of device [ 2879.554181] loop1: rw=1, want=953, limit=112 [ 2879.564216] attempt to access beyond end of device [ 2879.571959] loop1: rw=1, want=974, limit=112 [ 2879.578317] XFS (loop2): Mounting V4 Filesystem [ 2879.599400] XFS (loop2): totally zeroed log [ 2879.614900] attempt to access beyond end of device [ 2879.625956] XFS (loop2): Failed to read root inode 0x700000d88, error 22 [ 2879.633687] loop1: rw=1, want=975, limit=112 [ 2879.644561] attempt to access beyond end of device 09:27:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0xc0ffff00000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:21 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0xf0ffff) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:21 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a00000001000010000000000100fffffff600035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2879.706599] loop1: rw=1, want=976, limit=112 [ 2879.723460] attempt to access beyond end of device [ 2879.736013] loop1: rw=1, want=977, limit=112 [ 2879.747361] attempt to access beyond end of device [ 2879.753032] loop1: rw=1, want=1026, limit=112 [ 2879.759542] attempt to access beyond end of device [ 2879.765363] loop1: rw=1, want=1027, limit=112 09:27:21 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x01', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2879.809606] attempt to access beyond end of device [ 2879.814728] loop1: rw=1, want=1028, limit=112 [ 2879.819910] attempt to access beyond end of device [ 2879.884334] loop1: rw=1, want=1029, limit=112 [ 2879.907388] attempt to access beyond end of device [ 2879.940105] loop1: rw=1, want=1038, limit=112 [ 2879.969206] attempt to access beyond end of device [ 2880.008438] XFS (loop0): Mounting V4 Filesystem [ 2880.023838] loop1: rw=1, want=1039, limit=112 [ 2880.032203] XFS (loop0): Log size -167771302 blocks too large, maximum size is 1048576 blocks [ 2880.036972] attempt to access beyond end of device [ 2880.046490] XFS (loop0): Log size out of supported range. [ 2880.049984] loop1: rw=1, want=1040, limit=112 [ 2880.052043] XFS (loop0): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 2880.052496] XFS (loop0): Invalid block length (0x1) for buffer [ 2880.074201] XFS (loop0): empty log check failed [ 2880.074540] attempt to access beyond end of device [ 2880.079569] XFS (loop0): log mount/recovery failed: error -12 [ 2880.084548] loop1: rw=1, want=1041, limit=112 [ 2880.106921] XFS (loop0): log mount failed [ 2880.124236] attempt to access beyond end of device [ 2880.165713] loop1: rw=1, want=5137, limit=112 [ 2880.181586] attempt to access beyond end of device [ 2880.186767] loop1: rw=1, want=9233, limit=112 [ 2880.196127] attempt to access beyond end of device [ 2880.201770] loop1: rw=1, want=13329, limit=112 [ 2880.215020] attempt to access beyond end of device [ 2880.224926] loop1: rw=1, want=17425, limit=112 [ 2880.249741] attempt to access beyond end of device [ 2880.256006] loop1: rw=1, want=21521, limit=112 [ 2880.321752] attempt to access beyond end of device [ 2880.329627] loop1: rw=1, want=25617, limit=112 [ 2880.345730] attempt to access beyond end of device [ 2880.353400] loop1: rw=1, want=29713, limit=112 [ 2880.370466] attempt to access beyond end of device [ 2880.375475] loop1: rw=1, want=32993, limit=112 09:27:22 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:27:22 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000800000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:22 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x03', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:22 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0xc0ffff00000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:22 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a00000001000010000000000100fffffdfc00035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:22 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x1000000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2881.239038] attempt to access beyond end of device [ 2881.249695] loop1: rw=1, want=130, limit=112 [ 2881.254196] attempt to access beyond end of device [ 2881.259570] loop1: rw=1, want=131, limit=112 [ 2881.264055] attempt to access beyond end of device [ 2881.269675] loop1: rw=1, want=132, limit=112 [ 2881.274207] attempt to access beyond end of device [ 2881.279525] loop1: rw=1, want=133, limit=112 [ 2881.284041] attempt to access beyond end of device [ 2881.289636] loop1: rw=1, want=142, limit=112 [ 2881.294155] attempt to access beyond end of device [ 2881.299670] loop1: rw=1, want=143, limit=112 [ 2881.304195] attempt to access beyond end of device [ 2881.310877] loop1: rw=1, want=144, limit=112 [ 2881.315604] attempt to access beyond end of device [ 2881.326171] loop1: rw=1, want=145, limit=112 [ 2881.361068] attempt to access beyond end of device [ 2881.385314] loop1: rw=1, want=4241, limit=112 [ 2881.408905] attempt to access beyond end of device [ 2881.425841] loop1: rw=1, want=4313, limit=112 [ 2881.432965] attempt to access beyond end of device [ 2881.448162] XFS (loop0): Mounting V4 Filesystem [ 2881.472730] XFS (loop0): Log size -67108006 blocks too large, maximum size is 1048576 blocks [ 2881.474181] loop1: rw=1, want=4342, limit=112 [ 2881.490887] attempt to access beyond end of device [ 2881.510598] loop1: rw=1, want=4343, limit=112 09:27:23 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x03', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2881.530346] attempt to access beyond end of device [ 2881.539642] XFS (loop2): Mounting V4 Filesystem [ 2881.554478] loop1: rw=1, want=4344, limit=112 [ 2881.564358] XFS (loop0): Log size out of supported range. [ 2881.570737] XFS (loop2): totally zeroed log 09:27:23 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x2000000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2881.570814] XFS (loop0): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 2881.588477] XFS (loop2): Failed to read root inode 0x800000d88, error 22 [ 2881.596684] attempt to access beyond end of device [ 2881.602525] loop1: rw=1, want=4345, limit=112 [ 2881.612067] attempt to access beyond end of device [ 2881.618472] XFS (loop0): Invalid block length (0x1) for buffer [ 2881.618609] loop1: rw=1, want=4366, limit=112 [ 2881.629750] attempt to access beyond end of device [ 2881.635247] loop1: rw=1, want=4367, limit=112 [ 2881.640730] attempt to access beyond end of device [ 2881.643407] XFS (loop0): empty log check failed [ 2881.645868] loop1: rw=1, want=4368, limit=112 [ 2881.655695] attempt to access beyond end of device [ 2881.660988] loop1: rw=1, want=4369, limit=112 [ 2881.665592] attempt to access beyond end of device [ 2881.691916] XFS (loop0): log mount/recovery failed: error -12 [ 2881.694779] loop1: rw=1, want=4418, limit=112 [ 2881.720653] XFS (loop0): log mount failed [ 2881.725457] attempt to access beyond end of device [ 2881.737876] loop1: rw=1, want=4419, limit=112 [ 2881.743652] attempt to access beyond end of device [ 2881.755660] loop1: rw=1, want=4420, limit=112 [ 2881.763956] attempt to access beyond end of device [ 2881.771119] loop1: rw=1, want=4421, limit=112 [ 2881.775739] attempt to access beyond end of device [ 2881.781186] loop1: rw=1, want=4430, limit=112 [ 2881.785986] attempt to access beyond end of device [ 2881.791735] loop1: rw=1, want=4431, limit=112 [ 2881.796713] attempt to access beyond end of device [ 2881.824106] loop1: rw=1, want=4432, limit=112 [ 2881.836043] attempt to access beyond end of device [ 2881.841469] loop1: rw=1, want=4433, limit=112 [ 2881.853516] attempt to access beyond end of device [ 2881.859475] loop1: rw=1, want=8529, limit=112 [ 2881.874338] attempt to access beyond end of device [ 2881.880285] loop1: rw=1, want=12625, limit=112 [ 2881.895867] attempt to access beyond end of device [ 2881.901022] loop1: rw=1, want=16721, limit=112 [ 2881.953880] attempt to access beyond end of device [ 2881.994305] loop1: rw=1, want=20817, limit=112 09:27:23 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000900000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:23 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x03', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:23 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x3000000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:23 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a00000001000010000000000100fffffffe00035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2882.072269] attempt to access beyond end of device [ 2882.078214] loop1: rw=1, want=24913, limit=112 [ 2882.100260] attempt to access beyond end of device [ 2882.107013] loop1: rw=1, want=29009, limit=112 [ 2882.124475] attempt to access beyond end of device [ 2882.129650] loop1: rw=1, want=32993, limit=112 [ 2882.573430] XFS (loop2): Mounting V4 Filesystem [ 2882.579902] XFS (loop0): Mounting V4 Filesystem [ 2882.585157] XFS (loop0): Log size -33553574 blocks too large, maximum size is 1048576 blocks [ 2882.631039] XFS (loop2): totally zeroed log [ 2882.646947] XFS (loop0): Log size out of supported range. [ 2882.652699] XFS (loop2): Failed to read root inode 0x900000d88, error 22 [ 2882.664568] XFS (loop0): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 2882.716792] XFS (loop0): Invalid block length (0x1) for buffer [ 2882.724777] XFS (loop0): empty log check failed [ 2882.731284] XFS (loop0): log mount/recovery failed: error -12 [ 2882.737941] XFS (loop0): log mount failed 09:27:25 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\xc0', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:25 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x4000000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:25 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0xc0ffff00000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:25 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a00000001000010000000000100fcfdffff00035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:25 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:27:25 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000a00000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2883.709414] attempt to access beyond end of device [ 2883.714646] loop1: rw=1, want=130, limit=112 [ 2883.719889] attempt to access beyond end of device [ 2883.725081] loop1: rw=1, want=131, limit=112 [ 2883.729864] attempt to access beyond end of device [ 2883.735045] loop1: rw=1, want=132, limit=112 [ 2883.741689] attempt to access beyond end of device [ 2883.764558] loop1: rw=1, want=133, limit=112 [ 2883.810662] attempt to access beyond end of device [ 2883.848066] loop1: rw=1, want=142, limit=112 09:27:25 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x60000000000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2883.868407] attempt to access beyond end of device [ 2883.875251] loop1: rw=1, want=143, limit=112 [ 2883.882024] attempt to access beyond end of device [ 2883.887683] loop1: rw=1, want=144, limit=112 [ 2883.892171] buffer_io_error: 43 callbacks suppressed [ 2883.892180] Buffer I/O error on dev loop1, logical block 143, lost async page write [ 2883.903299] attempt to access beyond end of device [ 2883.910819] loop1: rw=1, want=145, limit=112 [ 2883.915434] Buffer I/O error on dev loop1, logical block 144, lost async page write [ 2883.938536] XFS (loop0): Mounting V4 Filesystem [ 2883.946026] XFS (loop2): Mounting V4 Filesystem [ 2883.952571] XFS (loop2): totally zeroed log [ 2883.952768] XFS (loop0): Log size -16776358 blocks too large, maximum size is 1048576 blocks [ 2883.965877] XFS (loop2): Failed to read root inode 0xa00000d88, error 22 [ 2883.980650] attempt to access beyond end of device [ 2883.986406] XFS (loop0): Log size out of supported range. [ 2883.991992] loop1: rw=1, want=4241, limit=112 [ 2884.006026] XFS (loop0): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. 09:27:25 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x03', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:25 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x5000000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2884.040973] attempt to access beyond end of device [ 2884.055532] loop1: rw=1, want=8337, limit=112 [ 2884.064667] XFS (loop0): Invalid block length (0x1) for buffer [ 2884.084316] XFS (loop0): empty log check failed [ 2884.103892] attempt to access beyond end of device [ 2884.109446] XFS (loop0): log mount/recovery failed: error -12 [ 2884.139463] loop1: rw=1, want=12433, limit=112 [ 2884.152344] XFS (loop0): log mount failed [ 2884.162272] attempt to access beyond end of device [ 2884.170419] loop1: rw=1, want=16529, limit=112 [ 2884.260830] attempt to access beyond end of device [ 2884.265780] loop1: rw=1, want=20625, limit=112 09:27:26 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000b00000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2884.303514] attempt to access beyond end of device [ 2884.311417] loop1: rw=1, want=24721, limit=112 09:27:26 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a00000001000010000000000100f6ffffff00035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2884.361281] attempt to access beyond end of device [ 2884.368685] loop1: rw=1, want=28817, limit=112 [ 2884.404332] attempt to access beyond end of device [ 2884.412349] loop1: rw=1, want=32889, limit=112 09:27:26 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:26 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x6000000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2884.631665] XFS (loop0): Mounting V4 Filesystem [ 2884.643316] XFS (loop0): Log size -16776358 blocks too large, maximum size is 1048576 blocks [ 2884.675717] XFS (loop2): Mounting V4 Filesystem [ 2884.690314] XFS (loop2): totally zeroed log [ 2884.701238] XFS (loop0): Log size out of supported range. [ 2884.712461] XFS (loop2): Failed to read root inode 0xb00000d88, error 22 [ 2884.742131] XFS (loop0): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 2884.796077] XFS (loop0): Invalid block length (0x1) for buffer [ 2884.806882] XFS (loop0): empty log check failed [ 2884.826521] XFS (loop0): log mount/recovery failed: error -12 [ 2884.886852] XFS (loop0): log mount failed [ 2884.921147] XFS (loop4): Mounting V4 Filesystem [ 2884.956354] XFS (loop4): totally zeroed log [ 2884.969928] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2885.047647] attempt to access beyond end of device [ 2885.061077] loop5: rw=1, want=130, limit=112 [ 2885.074842] Buffer I/O error on dev loop5, logical block 129, lost async page write [ 2885.115775] attempt to access beyond end of device [ 2885.132605] loop5: rw=1, want=131, limit=112 [ 2885.144654] Buffer I/O error on dev loop5, logical block 130, lost async page write [ 2885.237211] attempt to access beyond end of device [ 2885.242164] loop5: rw=1, want=132, limit=112 [ 2885.330573] Buffer I/O error on dev loop5, logical block 131, lost async page write [ 2885.341417] attempt to access beyond end of device [ 2885.349413] loop5: rw=1, want=133, limit=112 [ 2885.353834] Buffer I/O error on dev loop5, logical block 132, lost async page write [ 2885.364520] attempt to access beyond end of device [ 2885.373939] loop5: rw=1, want=142, limit=112 [ 2885.416345] Buffer I/O error on dev loop5, logical block 141, lost async page write [ 2885.424175] attempt to access beyond end of device [ 2885.509897] loop5: rw=1, want=143, limit=112 [ 2885.514322] Buffer I/O error on dev loop5, logical block 142, lost async page write [ 2885.591877] attempt to access beyond end of device [ 2885.625952] loop5: rw=1, want=144, limit=112 [ 2885.668993] Buffer I/O error on dev loop5, logical block 143, lost async page write [ 2885.720316] attempt to access beyond end of device [ 2885.743044] loop5: rw=1, want=145, limit=112 [ 2885.759592] Buffer I/O error on dev loop5, logical block 144, lost async page write [ 2885.785782] attempt to access beyond end of device [ 2885.794120] loop5: rw=1, want=921, limit=112 [ 2885.813030] attempt to access beyond end of device [ 2885.821252] loop5: rw=1, want=950, limit=112 [ 2885.825802] attempt to access beyond end of device [ 2885.834038] loop5: rw=1, want=951, limit=112 [ 2885.859226] attempt to access beyond end of device [ 2885.880237] loop5: rw=1, want=952, limit=112 [ 2885.901927] attempt to access beyond end of device [ 2885.925239] loop5: rw=1, want=953, limit=112 [ 2885.941236] attempt to access beyond end of device [ 2885.955646] loop5: rw=1, want=974, limit=112 [ 2885.970694] attempt to access beyond end of device [ 2885.985034] loop5: rw=1, want=975, limit=112 [ 2886.001411] attempt to access beyond end of device [ 2886.014484] loop5: rw=1, want=976, limit=112 [ 2886.030735] attempt to access beyond end of device [ 2886.045985] loop5: rw=1, want=977, limit=112 [ 2886.061567] attempt to access beyond end of device [ 2886.100373] loop5: rw=1, want=1026, limit=112 [ 2886.112996] attempt to access beyond end of device [ 2886.129579] loop5: rw=1, want=1027, limit=112 09:27:27 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:27:27 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000002000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:27 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x40000000000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:27 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a00000001000010000000000100feffffff00035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:27 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:27 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x7000000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2886.154405] attempt to access beyond end of device [ 2886.159483] loop5: rw=1, want=1028, limit=112 [ 2886.164085] attempt to access beyond end of device [ 2886.169222] loop5: rw=1, want=1029, limit=112 [ 2886.173832] attempt to access beyond end of device [ 2886.195433] loop5: rw=1, want=1038, limit=112 [ 2886.203617] attempt to access beyond end of device [ 2886.212702] loop5: rw=1, want=1039, limit=112 [ 2886.218532] attempt to access beyond end of device [ 2886.220403] attempt to access beyond end of device [ 2886.229231] loop5: rw=1, want=1040, limit=112 [ 2886.239368] attempt to access beyond end of device [ 2886.247177] loop5: rw=1, want=1041, limit=112 [ 2886.256817] loop1: rw=1, want=130, limit=112 [ 2886.267115] attempt to access beyond end of device [ 2886.278569] attempt to access beyond end of device [ 2886.278729] loop5: rw=1, want=5137, limit=112 [ 2886.283511] loop1: rw=1, want=131, limit=112 [ 2886.283548] attempt to access beyond end of device [ 2886.283559] loop1: rw=1, want=132, limit=112 [ 2886.283588] attempt to access beyond end of device [ 2886.292372] attempt to access beyond end of device [ 2886.297904] loop5: rw=1, want=5681, limit=112 [ 2886.348966] loop1: rw=1, want=133, limit=112 [ 2886.358139] XFS (loop0): Mounting V4 Filesystem [ 2886.365963] XFS (loop0): Log size -16776358 blocks too large, maximum size is 1048576 blocks [ 2886.392205] XFS (loop2): Mounting V4 Filesystem [ 2886.392230] XFS (loop4): Mounting V4 Filesystem [ 2886.402316] XFS (loop2): totally zeroed log [ 2886.404016] attempt to access beyond end of device [ 2886.408391] XFS (loop0): Log size out of supported range. [ 2886.417684] XFS (loop2): Failed to read root inode 0x2000000d88, error 22 [ 2886.420021] loop1: rw=1, want=142, limit=112 [ 2886.426615] XFS (loop0): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 2886.443545] XFS (loop0): Invalid block length (0x1) for buffer [ 2886.443894] XFS (loop4): totally zeroed log [ 2886.456865] attempt to access beyond end of device [ 2886.461153] XFS (loop0): empty log check failed [ 2886.470352] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2886.483604] loop1: rw=1, want=143, limit=112 [ 2886.489202] XFS (loop0): log mount/recovery failed: error -12 [ 2886.495781] attempt to access beyond end of device [ 2886.501463] loop1: rw=1, want=144, limit=112 [ 2886.506888] XFS (loop0): log mount failed [ 2886.513953] attempt to access beyond end of device [ 2886.519771] loop1: rw=1, want=145, limit=112 09:27:28 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0xf000000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2886.541315] attempt to access beyond end of device [ 2886.550328] loop1: rw=1, want=4241, limit=112 [ 2886.568397] attempt to access beyond end of device [ 2886.574708] loop1: rw=1, want=8337, limit=112 [ 2886.589170] attempt to access beyond end of device [ 2886.594213] loop1: rw=1, want=12433, limit=112 [ 2886.604784] attempt to access beyond end of device [ 2886.609840] loop1: rw=1, want=16529, limit=112 [ 2886.622249] attempt to access beyond end of device [ 2886.629498] loop1: rw=1, want=20625, limit=112 [ 2886.642435] attempt to access beyond end of device [ 2886.647466] loop1: rw=1, want=24721, limit=112 [ 2886.657920] attempt to access beyond end of device [ 2886.662852] loop1: rw=1, want=28817, limit=112 [ 2886.672038] attempt to access beyond end of device [ 2886.677026] loop1: rw=1, want=30305, limit=112 09:27:28 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000102000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2886.835014] XFS (loop0): Mounting V4 Filesystem [ 2886.853469] XFS (loop0): Log size -16776358 blocks too large, maximum size is 1048576 blocks 09:27:28 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x03', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2886.898235] XFS (loop0): Log size out of supported range. [ 2886.926884] XFS (loop0): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 2886.994197] XFS (loop0): AIL initialisation failed: error -12 [ 2887.012876] XFS (loop0): log mount failed 09:27:28 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x13000000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:28 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000002000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2887.121338] XFS (loop2): Mounting V4 Filesystem [ 2887.139351] XFS (loop2): totally zeroed log [ 2887.153568] XFS (loop2): Failed to read root inode 0x102000000d88, error 22 09:27:29 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000003f00000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2887.618917] XFS (loop0): Mounting V4 Filesystem [ 2887.640917] XFS (loop0): totally zeroed log [ 2887.659041] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2887.695201] XFS (loop2): Mounting V4 Filesystem [ 2887.719267] XFS (loop0): Unmount and run xfs_repair [ 2887.724721] XFS (loop2): totally zeroed log [ 2887.736694] XFS (loop2): Failed to read root inode 0x3f00000d88, error 22 [ 2887.740565] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2887.789445] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2887.821657] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2887.832873] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2887.844407] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2887.864307] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2887.875824] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2887.888511] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2887.927404] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:27:29 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 09:27:29 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:29 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x7000000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:29 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000004000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2887.984245] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2888.015995] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2888.038603] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2888.461733] XFS (loop2): Mounting V4 Filesystem [ 2888.494960] XFS (loop2): totally zeroed log [ 2888.502927] XFS (loop4): Mounting V4 Filesystem [ 2888.522681] XFS (loop4): totally zeroed log [ 2888.550588] XFS (loop2): Failed to read root inode 0x4000000d88, error 22 [ 2888.563777] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 09:27:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x20000000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:30 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000003000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:30 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x7000000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:30 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) [ 2888.911389] attempt to access beyond end of device [ 2888.916610] loop1: rw=1, want=130, limit=112 [ 2888.921028] buffer_io_error: 24 callbacks suppressed [ 2888.921037] Buffer I/O error on dev loop1, logical block 129, lost async page write [ 2888.935093] attempt to access beyond end of device [ 2888.940150] loop1: rw=1, want=131, limit=112 [ 2888.944577] Buffer I/O error on dev loop1, logical block 130, lost async page write [ 2888.952638] attempt to access beyond end of device 09:27:30 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000004006b6b6b00000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2888.957644] loop1: rw=1, want=132, limit=112 [ 2888.957664] Buffer I/O error on dev loop1, logical block 131, lost async page write [ 2888.987594] attempt to access beyond end of device [ 2888.992702] loop1: rw=1, want=133, limit=112 [ 2888.997360] Buffer I/O error on dev loop1, logical block 132, lost async page write [ 2889.005322] attempt to access beyond end of device 09:27:30 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x01', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2889.010671] loop1: rw=1, want=142, limit=112 [ 2889.015251] Buffer I/O error on dev loop1, logical block 141, lost async page write [ 2889.056059] attempt to access beyond end of device [ 2889.064949] loop1: rw=1, want=143, limit=112 [ 2889.069581] Buffer I/O error on dev loop1, logical block 142, lost async page write [ 2889.078053] attempt to access beyond end of device [ 2889.083513] loop1: rw=1, want=144, limit=112 [ 2889.093137] Buffer I/O error on dev loop1, logical block 143, lost async page write [ 2889.101377] attempt to access beyond end of device [ 2889.101448] loop1: rw=1, want=145, limit=112 [ 2889.112418] XFS (loop0): Mounting V4 Filesystem [ 2889.118536] Buffer I/O error on dev loop1, logical block 144, lost async page write [ 2889.126836] XFS (loop0): totally zeroed log [ 2889.131967] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2889.157157] attempt to access beyond end of device [ 2889.162274] loop1: rw=1, want=4241, limit=112 [ 2889.167777] XFS (loop0): Unmount and run xfs_repair [ 2889.183308] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2889.185367] attempt to access beyond end of device [ 2889.194439] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2889.196523] loop1: rw=1, want=8337, limit=112 [ 2889.205569] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2889.214085] attempt to access beyond end of device [ 2889.220520] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2889.221151] loop1: rw=1, want=10713, limit=112 [ 2889.235570] attempt to access beyond end of device [ 2889.240668] loop1: rw=1, want=10742, limit=112 [ 2889.245269] Buffer I/O error on dev loop1, logical block 10741, lost async page write [ 2889.245325] attempt to access beyond end of device [ 2889.245337] loop1: rw=1, want=10743, limit=112 [ 2889.245349] Buffer I/O error on dev loop1, logical block 10742, lost async page write [ 2889.245374] attempt to access beyond end of device [ 2889.261788] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2889.262974] loop1: rw=1, want=10744, limit=112 [ 2889.263013] attempt to access beyond end of device [ 2889.311029] loop1: rw=1, want=10745, limit=112 [ 2889.315805] attempt to access beyond end of device [ 2889.364254] loop1: rw=1, want=10766, limit=112 [ 2889.375755] XFS (loop2): Mounting V4 Filesystem [ 2889.383371] attempt to access beyond end of device [ 2889.396444] loop1: rw=1, want=10767, limit=112 [ 2889.396700] XFS (loop2): totally zeroed log [ 2889.406206] attempt to access beyond end of device 09:27:31 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x3f000000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:31 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x7000000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2889.415344] loop1: rw=1, want=10768, limit=112 [ 2889.430956] attempt to access beyond end of device [ 2889.437531] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2889.446095] XFS (loop2): Failed to read root inode 0x6b6b6b00000d88, error 22 [ 2889.456433] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2889.459819] loop1: rw=1, want=10769, limit=112 [ 2889.470378] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2889.481322] attempt to access beyond end of device [ 2889.481793] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2889.494736] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2889.504291] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2889.504384] loop1: rw=1, want=10818, limit=112 [ 2889.514191] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2889.552159] attempt to access beyond end of device [ 2889.564645] loop1: rw=1, want=10819, limit=112 [ 2889.569432] attempt to access beyond end of device [ 2889.574438] loop1: rw=1, want=10820, limit=112 [ 2889.585087] attempt to access beyond end of device [ 2889.594263] loop1: rw=1, want=10821, limit=112 [ 2889.599632] attempt to access beyond end of device [ 2889.604808] loop1: rw=1, want=10830, limit=112 [ 2889.610019] attempt to access beyond end of device [ 2889.615178] loop1: rw=1, want=10831, limit=112 [ 2889.620499] attempt to access beyond end of device [ 2889.625566] loop1: rw=1, want=10832, limit=112 [ 2889.630796] attempt to access beyond end of device [ 2889.635835] loop1: rw=1, want=10833, limit=112 [ 2889.647469] attempt to access beyond end of device [ 2889.656094] loop1: rw=1, want=14929, limit=112 [ 2889.722518] attempt to access beyond end of device 09:27:31 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x02', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2889.769955] loop1: rw=1, want=19025, limit=112 09:27:31 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000004ffffff8c00000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:31 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x6b6b6b00) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:31 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000004000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2889.813649] attempt to access beyond end of device [ 2889.824510] loop1: rw=1, want=23121, limit=112 [ 2889.840510] attempt to access beyond end of device [ 2889.845475] loop1: rw=1, want=27217, limit=112 [ 2889.881303] attempt to access beyond end of device [ 2889.897799] loop1: rw=1, want=30473, limit=112 09:27:31 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 09:27:31 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x03', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2890.220162] XFS (loop0): Mounting V4 Filesystem [ 2890.227410] XFS (loop2): Mounting V4 Filesystem [ 2890.239691] XFS (loop0): totally zeroed log [ 2890.245861] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2890.266588] XFS (loop2): totally zeroed log [ 2890.271470] XFS (loop2): Failed to read root inode 0xffffff8c00000d88, error 22 [ 2890.274992] XFS (loop0): Unmount and run xfs_repair [ 2890.316218] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2890.368939] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2890.399872] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2890.434415] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2890.450382] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2890.470730] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:27:32 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000edc000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2890.489474] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2890.504667] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2890.588747] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2890.600556] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2890.629288] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2890.652921] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2890.868119] XFS (loop2): Mounting V4 Filesystem [ 2890.889391] XFS (loop2): totally zeroed log [ 2890.903743] XFS (loop2): Failed to read root inode 0xedc000000d88, error 22 09:27:32 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 09:27:32 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000003f00000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:32 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000005000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:32 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x03', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:32 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x80040000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:32 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000004fffffff400000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2891.289086] XFS (loop5): Mounting V4 Filesystem [ 2891.340665] XFS (loop5): totally zeroed log [ 2891.373209] XFS (loop5): Failed to read root inode 0x3f00000d88, error 22 [ 2891.385272] XFS (loop2): Mounting V4 Filesystem [ 2891.390217] XFS (loop0): Mounting V4 Filesystem [ 2891.400918] XFS (loop2): totally zeroed log [ 2891.401281] XFS (loop0): totally zeroed log [ 2891.414637] XFS (loop2): Failed to read root inode 0xfffffff400000d88, error 22 [ 2891.448831] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2891.496180] XFS (loop0): Unmount and run xfs_repair [ 2891.508743] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2891.518528] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2891.526956] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2891.535320] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:27:33 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2891.549554] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2891.575331] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2891.644635] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2891.682457] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2891.696134] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2891.711071] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2891.775477] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2891.797933] XFS (loop0): Failed to read root inode 0xd88, error 117 09:27:33 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80, 0x0, 0x0, 0x73d}, 0x10) sendto$inet6(r0, &(0x7f0000000000), 0x101d0, 0x0, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0xfffffffffffffd2d) [ 2892.170398] attempt to access beyond end of device [ 2892.175420] loop1: rw=1, want=130, limit=112 [ 2892.180468] attempt to access beyond end of device [ 2892.185411] loop1: rw=1, want=131, limit=112 [ 2892.199410] attempt to access beyond end of device [ 2892.204538] loop1: rw=1, want=132, limit=112 [ 2892.236365] attempt to access beyond end of device [ 2892.241313] loop1: rw=1, want=133, limit=112 [ 2892.245749] attempt to access beyond end of device 09:27:34 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000006000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:34 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000004fffffff600000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:34 executing program 5: syz_open_pts(0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) [ 2892.365491] loop1: rw=1, want=142, limit=112 [ 2892.383861] attempt to access beyond end of device [ 2892.403766] XFS (loop4): Mounting V4 Filesystem 09:27:34 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x8cffffff) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2892.411780] loop1: rw=1, want=143, limit=112 [ 2892.426644] attempt to access beyond end of device [ 2892.431897] XFS (loop4): totally zeroed log [ 2892.438428] loop1: rw=1, want=144, limit=112 [ 2892.442994] attempt to access beyond end of device [ 2892.448246] loop1: rw=1, want=145, limit=112 [ 2892.453190] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2892.464584] attempt to access beyond end of device [ 2892.514702] loop1: rw=1, want=4241, limit=112 [ 2892.584658] attempt to access beyond end of device [ 2892.622297] XFS (loop0): Mounting V4 Filesystem [ 2892.641747] XFS (loop0): totally zeroed log [ 2892.643448] loop1: rw=1, want=8337, limit=112 [ 2892.655765] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2892.682320] attempt to access beyond end of device 09:27:34 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x0f', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2892.718943] loop1: rw=1, want=8729, limit=112 [ 2892.722702] XFS (loop0): Unmount and run xfs_repair [ 2892.731863] XFS (loop2): Mounting V4 Filesystem [ 2892.748393] XFS (loop2): totally zeroed log [ 2892.752469] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2892.756909] attempt to access beyond end of device [ 2892.774357] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2892.782576] loop1: rw=1, want=8758, limit=112 [ 2892.794702] attempt to access beyond end of device 09:27:34 executing program 5: mlockall(0x1) clone(0x200000000080600, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) [ 2892.821904] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2892.826558] XFS (loop2): Failed to read root inode 0xfffffff600000d88, error 22 [ 2892.844424] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2892.860548] loop1: rw=1, want=8759, limit=112 09:27:34 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x7f', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2892.874316] attempt to access beyond end of device [ 2892.878876] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2892.888809] loop1: rw=1, want=8760, limit=112 [ 2892.893549] attempt to access beyond end of device [ 2892.901770] loop1: rw=1, want=8761, limit=112 [ 2892.923410] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2892.930147] attempt to access beyond end of device [ 2892.942290] loop1: rw=1, want=8782, limit=112 [ 2892.948396] attempt to access beyond end of device [ 2892.953482] loop1: rw=1, want=8783, limit=112 [ 2892.958772] attempt to access beyond end of device [ 2892.962009] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2892.963904] loop1: rw=1, want=8784, limit=112 [ 2892.982715] attempt to access beyond end of device [ 2892.990268] loop1: rw=1, want=8785, limit=112 [ 2892.992916] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2892.994965] attempt to access beyond end of device [ 2893.014091] loop1: rw=1, want=8834, limit=112 [ 2893.051189] attempt to access beyond end of device [ 2893.060449] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2893.066771] loop1: rw=1, want=8835, limit=112 [ 2893.074097] attempt to access beyond end of device [ 2893.081279] loop1: rw=1, want=8836, limit=112 09:27:34 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000004fffffffb00000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2893.107649] attempt to access beyond end of device [ 2893.112851] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2893.125976] loop1: rw=1, want=8837, limit=112 [ 2893.151175] attempt to access beyond end of device [ 2893.152280] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2893.169219] loop1: rw=1, want=8846, limit=112 [ 2893.176477] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2893.185590] attempt to access beyond end of device [ 2893.197598] loop1: rw=1, want=8847, limit=112 [ 2893.203609] attempt to access beyond end of device [ 2893.218616] loop1: rw=1, want=8848, limit=112 [ 2893.225707] attempt to access beyond end of device [ 2893.231499] loop1: rw=1, want=8849, limit=112 [ 2893.243117] attempt to access beyond end of device [ 2893.268357] loop1: rw=1, want=12945, limit=112 [ 2893.307710] attempt to access beyond end of device 09:27:35 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2893.357150] loop1: rw=1, want=17041, limit=112 09:27:35 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000008000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2893.428940] attempt to access beyond end of device [ 2893.451831] loop1: rw=1, want=21137, limit=112 [ 2893.484438] XFS (loop2): Mounting V4 Filesystem 09:27:35 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0xe5ffffff) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2893.519345] XFS (loop2): totally zeroed log [ 2893.527887] XFS (loop2): Failed to read root inode 0xfffffffb00000d88, error 22 [ 2893.531721] attempt to access beyond end of device [ 2893.566926] loop1: rw=1, want=25233, limit=112 [ 2893.593712] attempt to access beyond end of device [ 2893.623081] loop1: rw=1, want=29273, limit=112 [ 2893.633816] XFS (loop0): Mounting V4 Filesystem [ 2893.689360] XFS (loop0): totally zeroed log [ 2893.739509] XFS (loop4): Mounting V4 Filesystem [ 2893.744553] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2893.763617] XFS (loop4): totally zeroed log [ 2893.780081] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2893.817883] XFS (loop0): Unmount and run xfs_repair [ 2893.822918] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2893.930375] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2894.019306] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2894.096468] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2894.104628] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2894.166484] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2894.188238] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2894.223720] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2894.256749] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2894.309196] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2894.348428] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2894.371877] XFS (loop0): Failed to read root inode 0xd88, error 117 09:27:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'security\x00'}, 0x0) 09:27:36 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c19000000000000000400000fff00000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:36 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs0', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:36 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000010000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:36 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0xf6ffffff) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2894.925034] XFS (loop0): Mounting V4 Filesystem 09:27:36 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2894.957506] XFS (loop0): totally zeroed log [ 2894.962956] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2895.016472] XFS (loop0): Unmount and run xfs_repair [ 2895.025117] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2895.027081] XFS (loop2): Mounting V4 Filesystem [ 2895.080664] XFS (loop2): totally zeroed log [ 2895.094755] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2895.107207] XFS (loop2): Failed to read root inode 0xfff00000d88, error 22 [ 2895.151245] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2895.215028] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2895.277292] XFS (loop4): Mounting V4 Filesystem [ 2895.285532] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2895.308093] XFS (loop4): totally zeroed log [ 2895.321370] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2895.330486] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2895.353708] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2895.383869] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2895.425939] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2895.455258] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2895.474391] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2895.484394] XFS (loop0): Failed to read root inode 0xd88, error 117 09:27:38 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 09:27:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000002280), 0x131f7a) clone(0x22102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendto$unix(r1, 0x0, 0x0, 0x20004000, &(0x7f0000000100)=@abs, 0x6e) setsockopt$sock_timeval(r1, 0x1, 0x0, 0x0, 0x0) 09:27:38 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000047fffffff00000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:38 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x1d', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:38 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a00000001000010000000000100000a010000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:38 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0xf7000000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) [ 2896.894831] XFS (loop0): Mounting V4 Filesystem [ 2896.921004] XFS (loop0): totally zeroed log [ 2896.938870] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2896.961377] XFS (loop2): Mounting V4 Filesystem [ 2896.965167] XFS (loop0): Unmount and run xfs_repair [ 2896.982700] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2896.996090] XFS (loop2): totally zeroed log [ 2897.013217] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:27:38 executing program 5: add_key(&(0x7f0000000880)='keyring\x006\xf9\x12l\x12\x05O\\\x0e\x18\xc6R%s\xddy\xf1\xa0\xa3\xa6\tW\xd6\xc7)\xad\x85l\xd8\xf0\xdf\x9c\x04\xd1\x8eW\x90K\x1c\x05 \x9d\xee\x12\xf5\xcc\xc1-\x98\xa7\x007g46a\x0f\xaa\xc8\x8b\xcf\x96\x81\x91\x87\x89\xc2\xadG6e\x98K\x17\x86\x8d\x9c^\x90\x81>\x9e\xc1\xf7?\xde\xbfV8\xf9\xc0\x1f\x88!\xf1\xf7\x8e\xba\xc9\x84\xe3\x85.\xe1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000140)='\x00', 0x0) 09:27:38 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x1e', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2897.034780] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2897.058198] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2897.059896] XFS (loop2): Failed to read root inode 0x7fffffff00000d88, error 22 [ 2897.091782] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2897.118374] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2897.163196] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2897.196718] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2897.229910] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:27:38 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f00000000c0)={{0x5}, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0xfdfdffff00000000]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") write$FUSE_DIRENT(r0, &(0x7f0000000140)={0x10}, 0x10) [ 2897.270714] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2897.297391] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 09:27:39 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000048cffffff00000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2897.346425] XFS (loop0): Failed to read root inode 0xd88, error 117 09:27:39 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000001c0)=0xfffffffffffffffa) 09:27:39 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) request_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz'}, 0x0, 0xfffffffffffffffe) 09:27:39 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x1f', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:39 executing program 5: getsockname(0xffffffffffffff9c, &(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000040)=0x80) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000492bd7ee76900c26ea8269f2807f9687a959da7f98d61f173256cf89e5aca92a6b4b5e3318594b5cae9085cde5bbd3c45ee0b640bf42661019cb3e07c42185049cab557b5b4064e1288cf0d53bb18d59659363ad6879a8f99f82d1153975506457638dfdf998d70bd0e97df92912206113a68acbbc88fa2c8940890ef24f77010a9b586a17113c82a3d60d71b884e2055c4888f8bba169ca"], 0x1) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000080)="df6c51c7bf5f8a4d8643869e4ccb891cdfcdf8426b0192fdaceef8985d539aa3ca359c284afe17", 0x27) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000000c0)={'ip6_vth0\x00', {0x2, 0x0, @multicast2}}) setsockopt$inet6_buf(r1, 0x29, 0x80000000000040, &(0x7f0000000080), 0x2b) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200, 0x0) 09:27:39 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a00000001000010000000000100001c010000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:39 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0xfeffffff) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:39 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000001c0)=0xfffffffffffffffa) 09:27:39 executing program 5: getsockname(0xffffffffffffff9c, &(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000040)=0x80) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000492bd7ee76900c26ea8269f2807f9687a959da7f98d61f173256cf89e5aca92a6b4b5e3318594b5cae9085cde5bbd3c45ee0b640bf42661019cb3e07c42185049cab557b5b4064e1288cf0d53bb18d59659363ad6879a8f99f82d1153975506457638dfdf998d70bd0e97df92912206113a68acbbc88fa2c8940890ef24f77010a9b586a17113c82a3d60d71b884e2055c4888f8bba169ca"], 0x1) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000080)="df6c51c7bf5f8a4d8643869e4ccb891cdfcdf8426b0192fdaceef8985d539aa3ca359c284afe17", 0x27) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000000c0)={'ip6_vth0\x00', {0x2, 0x0, @multicast2}}) setsockopt$inet6_buf(r1, 0x29, 0x80000000000040, &(0x7f0000000080), 0x2b) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200, 0x0) [ 2897.852583] XFS (loop2): Mounting V4 Filesystem [ 2897.859120] XFS (loop2): totally zeroed log [ 2897.863793] XFS (loop2): Failed to read root inode 0x8cffffff00000d88, error 22 09:27:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) readv(r1, &(0x7f0000000400)=[{&(0x7f00000001c0)=""/15, 0xf}], 0x1) 09:27:39 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs ', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2898.167863] XFS (loop0): Mounting V4 Filesystem 09:27:39 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000004f4ffffff00000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:39 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x29, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_IFNAME={0x14, 0x3, ':pq0\x00'}]}, 0x34}}, 0x0) [ 2898.203364] XFS (loop0): totally zeroed log [ 2898.227070] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2898.254650] XFS (loop0): Unmount and run xfs_repair [ 2898.273608] XFS (loop0): First 128 bytes of corrupted metadata buffer: 09:27:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000180), 0xfeed, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000000900)=""/4096, 0xffffffffffffff78, 0x0, 0x0, 0x1c4) [ 2898.315668] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2898.360301] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2898.385670] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:27:40 executing program 1: socket(0x1e, 0x4, 0x0) socket$rxrpc(0x21, 0x2, 0xa) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) lstat(0x0, 0x0) r2 = socket(0x800000002b, 0x1, 0x0) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)}, 0x20008850) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 2898.404365] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2898.412959] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2898.421446] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2898.429861] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:27:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r1, 0x101, 0x19, &(0x7f00000000c0), &(0x7f0000000180)=0x4) [ 2898.521438] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2898.557238] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 09:27:40 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs!', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2898.606542] XFS (loop2): Mounting V4 Filesystem [ 2898.607498] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2898.629101] XFS (loop2): totally zeroed log [ 2898.636153] XFS (loop2): Failed to read root inode 0xf4ffffff00000d88, error 22 [ 2898.665216] XFS (loop0): Failed to read root inode 0xd88, error 117 09:27:40 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000030000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2899.020050] XFS (loop0): Mounting V4 Filesystem [ 2899.035335] XFS (loop0): totally zeroed log [ 2899.056495] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2899.070510] XFS (loop0): Unmount and run xfs_repair [ 2899.075792] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2899.092499] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2899.121218] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2899.138135] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2899.148922] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2899.157857] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2899.178896] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2899.212135] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:27:40 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0xffff8000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) read(r0, 0x0, 0x0) io_setup(0x5, &(0x7f0000000200)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x1}]) 09:27:40 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000004f6ffffff00000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:40 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\"', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:40 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000001c0)) ioctl$PPPIOCSPASS(r0, 0x40107447, 0x0) [ 2899.228854] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2899.243084] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2899.262370] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2899.271226] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2899.374551] XFS (loop2): Mounting V4 Filesystem 09:27:41 executing program 5: [ 2899.425528] XFS (loop2): totally zeroed log [ 2899.438256] XFS (loop2): Failed to read root inode 0xf6ffffff00000d88, error 22 09:27:41 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000080040000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:41 executing program 5: 09:27:41 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs#', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:41 executing program 1: 09:27:41 executing program 5: 09:27:41 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000004fbffffff00000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:41 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0xffffc000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:41 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs$', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:41 executing program 1: 09:27:41 executing program 5: [ 2899.913611] XFS (loop0): Mounting V4 Filesystem [ 2899.943816] XFS (loop0): totally zeroed log 09:27:41 executing program 1: [ 2900.008202] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2900.029684] XFS (loop2): Mounting V4 Filesystem [ 2900.036701] XFS (loop0): Unmount and run xfs_repair [ 2900.042174] XFS (loop2): totally zeroed log [ 2900.042600] XFS (loop0): First 128 bytes of corrupted metadata buffer: 09:27:41 executing program 5: [ 2900.067236] XFS (loop2): Failed to read root inode 0xfbffffff00000d88, error 22 [ 2900.076412] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2900.102422] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2900.116523] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2900.128366] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2900.145023] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2900.188345] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2900.217445] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2900.275931] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2900.302759] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2900.318433] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2900.342808] XFS (loop0): Failed to read root inode 0xd88, error 117 09:27:42 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000050000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:42 executing program 1: 09:27:42 executing program 5: 09:27:42 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs%', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:42 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040002000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:42 executing program 1: 09:27:42 executing program 5: 09:27:42 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0xfffff000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:42 executing program 5: [ 2901.009483] XFS (loop2): Mounting V4 Filesystem [ 2901.036691] XFS (loop2): totally zeroed log 09:27:42 executing program 1: 09:27:42 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs&', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2901.066744] XFS (loop2): Failed to read root inode 0x2000000000d88, error 22 [ 2901.123074] XFS (loop0): Mounting V4 Filesystem [ 2901.159798] XFS (loop0): totally zeroed log [ 2901.175953] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 09:27:42 executing program 5: [ 2901.235876] XFS (loop0): Unmount and run xfs_repair [ 2901.259410] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2901.281879] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2901.346198] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2901.379800] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2901.400267] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2901.411531] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2901.451020] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2901.504945] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2901.549340] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2901.564022] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2901.580830] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2901.605737] XFS (loop0): Failed to read root inode 0xd88, error 117 09:27:43 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000060000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:43 executing program 1: 09:27:43 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040004000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:43 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\'', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:43 executing program 5: 09:27:43 executing program 5: 09:27:43 executing program 1: [ 2901.998359] XFS (loop2): Mounting V4 Filesystem [ 2902.015036] XFS (loop2): totally zeroed log [ 2902.028043] XFS (loop0): Mounting V4 Filesystem [ 2902.039493] XFS (loop2): Failed to read root inode 0x4000000000d88, error 22 [ 2902.086700] XFS (loop0): totally zeroed log [ 2902.116004] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2902.174008] XFS (loop0): Unmount and run xfs_repair [ 2902.181895] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2902.188814] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2902.197346] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2902.205690] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2902.214025] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2902.222565] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2902.233517] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2902.242087] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2902.288661] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2902.302553] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2902.334181] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2902.350674] XFS (loop0): Failed to read root inode 0xd88, error 117 09:27:44 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0xffffff8c) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:44 executing program 5: 09:27:44 executing program 1: 09:27:44 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs(', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:44 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040005000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:44 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a0000000100001000000000010000010a0000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:44 executing program 5: 09:27:44 executing program 1: 09:27:44 executing program 5: 09:27:44 executing program 1: [ 2902.669000] XFS (loop2): Mounting V4 Filesystem [ 2902.681030] XFS (loop2): totally zeroed log [ 2902.728222] XFS (loop2): Failed to read root inode 0x5000000000d88, error 22 09:27:44 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs)', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:44 executing program 1: [ 2902.830764] XFS (loop0): Mounting V4 Filesystem [ 2902.859992] XFS (loop0): totally zeroed log [ 2902.892151] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2902.930310] XFS (loop0): Unmount and run xfs_repair [ 2902.951426] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2902.985503] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2903.000148] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2903.015977] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2903.024843] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2903.036012] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2903.051235] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2903.079214] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2903.101096] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2903.109635] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2903.122481] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2903.131704] XFS (loop0): Failed to read root inode 0xd88, error 117 09:27:45 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040007000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:45 executing program 5: 09:27:45 executing program 1: 09:27:45 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs*', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:45 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a0000000100001000000000010000011c0000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:45 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0xffffffe5) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:45 executing program 5: 09:27:45 executing program 1: 09:27:45 executing program 5: 09:27:45 executing program 1: 09:27:45 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs+', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2903.879358] XFS (loop0): Mounting V4 Filesystem [ 2903.891104] XFS (loop2): Mounting V4 Filesystem [ 2903.912988] XFS (loop0): totally zeroed log [ 2903.915861] XFS (loop2): totally zeroed log [ 2903.925818] XFS (loop2): Failed to read root inode 0x7000000000d88, error 22 [ 2903.957129] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2904.004972] XFS (loop0): Unmount and run xfs_repair 09:27:45 executing program 5: [ 2904.038519] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2904.056162] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2904.065396] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2904.078729] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2904.101584] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2904.119835] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2904.149297] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2904.168675] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2904.177792] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2904.186180] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 09:27:45 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040008000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:45 executing program 1: 09:27:45 executing program 5: 09:27:45 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs,', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2904.243333] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2904.253937] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2904.442739] XFS (loop2): Mounting V4 Filesystem [ 2904.467064] XFS (loop2): totally zeroed log [ 2904.471993] XFS (loop2): Failed to read root inode 0x8000000000d88, error 22 09:27:46 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a0000000100001000000000010000003f0000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:46 executing program 5: 09:27:46 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) socket$packet(0x11, 0x3, 0x300) getitimer(0x0, &(0x7f0000000080)) 09:27:46 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0xfffffff6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:46 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000040)={'gre0\x00', @ifru_map}) 09:27:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f023c123f3188a070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000100)={0x0, 0x989680}, 0x0, 0x0) 09:27:46 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040009000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:46 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs-', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2904.900301] XFS (loop2): Mounting V4 Filesystem [ 2904.917974] XFS (loop2): totally zeroed log [ 2904.927266] XFS (loop0): Mounting V4 Filesystem [ 2904.942229] XFS (loop2): Failed to read root inode 0x9000000000d88, error 22 09:27:46 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000200)=0x78, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28}, {0x80000006}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 09:27:46 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ptmx\x00', 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8cac, 0x480000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'gretap0\x00'}) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0xe991) r2 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r2, &(0x7f0000847fff)='`', 0x1, 0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000040)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e23, 0x80000000, @loopback, 0xfd0}}, 0x24) openat$uhid(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uhid\x00', 0x802, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 2904.950122] XFS (loop0): totally zeroed log [ 2904.983340] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2905.016923] XFS (loop0): Unmount and run xfs_repair [ 2905.050000] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2905.075944] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2905.085010] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2905.094030] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2905.105722] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2905.114797] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2905.157287] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2905.212021] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2905.227489] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2905.238594] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2905.306745] net_ratelimit: 6 callbacks suppressed [ 2905.306753] protocol 88fb is buggy, dev hsr_slave_0 [ 2905.316795] protocol 88fb is buggy, dev hsr_slave_1 [ 2905.334360] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 09:27:47 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040008000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2905.396797] XFS (loop0): Failed to read root inode 0xd88, error 117 09:27:47 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs.', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2905.512863] XFS (loop2): Mounting V4 Filesystem [ 2905.525881] XFS (loop2): AIL initialisation failed: error -12 [ 2905.536371] protocol 88fb is buggy, dev hsr_slave_0 [ 2905.541486] protocol 88fb is buggy, dev hsr_slave_1 [ 2905.542590] XFS (loop2): log mount failed [ 2905.598852] XFS (loop1): Mounting V4 Filesystem [ 2905.624899] XFS (loop1): totally zeroed log [ 2905.636951] XFS (loop1): Failed to read root inode 0x8000000000d88, error 22 09:27:47 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000004800000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:47 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000004000a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:47 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0xfffffffe) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:47 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0xfffffff6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:47 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a0000000100001000000000010000010a0000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:47 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs/', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2906.226359] XFS (loop2): Mounting V4 Filesystem [ 2906.261049] XFS (loop2): totally zeroed log [ 2906.273267] XFS (loop2): Failed to read root inode 0xa000000000d88, error 22 [ 2906.293998] XFS (loop0): Mounting V4 Filesystem [ 2906.317711] XFS (loop0): totally zeroed log [ 2906.334435] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 09:27:48 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0xfffffff6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:48 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs7', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2906.383783] XFS (loop0): Unmount and run xfs_repair [ 2906.396564] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2906.404739] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2906.417653] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2906.419797] XFS (loop1): Mounting V4 Filesystem [ 2906.426049] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2906.439779] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2906.448769] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2906.468050] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2906.476829] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2906.485379] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2906.494467] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2906.504267] XFS (loop1): totally zeroed log [ 2906.516980] XFS (loop1): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2906.536622] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2906.556492] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2906.562965] XFS (loop1): Unmount and run xfs_repair [ 2906.562980] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 2906.575336] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:27:48 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000004000b000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2906.627851] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2906.650058] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2906.683262] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2906.691943] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2906.713793] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2906.726150] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2906.735007] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2906.743689] XFS (loop1): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2906.754884] XFS (loop1): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2906.790321] XFS (loop1): Failed to read root inode 0xd88, error 117 09:27:48 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000008800000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:48 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0xfffffff6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:48 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs?', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:48 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0xf6ffffff) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2907.139567] XFS (loop0): Mounting V4 Filesystem [ 2907.176383] XFS (loop0): totally zeroed log [ 2907.196217] XFS (loop2): Mounting V4 Filesystem [ 2907.201558] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 09:27:48 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2907.227913] XFS (loop2): totally zeroed log [ 2907.244456] XFS (loop0): Unmount and run xfs_repair [ 2907.265349] XFS (loop2): Failed to read root inode 0xb000000000d88, error 22 [ 2907.272746] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2907.307847] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:27:49 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs@', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2907.375420] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2907.419264] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2907.455977] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:27:49 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000004000e000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2907.486524] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2907.534176] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2907.581670] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2907.613616] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2907.692511] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 09:27:49 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfsA', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2907.757591] XFS (loop2): Mounting V4 Filesystem [ 2907.773835] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2907.788076] XFS (loop2): totally zeroed log [ 2907.815539] XFS (loop2): Failed to read root inode 0xe000000000d88, error 22 [ 2907.841854] XFS (loop0): Failed to read root inode 0xd88, error 117 09:27:49 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a00000001000010000000000100006b6b6b00035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:49 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002190a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:49 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfsB', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:49 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000050000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:49 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000140000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2908.390380] XFS (loop0): Mounting V4 Filesystem 09:27:50 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2908.421837] XFS (loop0): Log size 1795162970 blocks too large, maximum size is 1048576 blocks [ 2908.444871] XFS (loop0): Log size out of supported range. [ 2908.486401] XFS (loop0): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 2908.500345] XFS (loop5): Mounting V4 Filesystem [ 2908.507672] XFS (loop2): Mounting V4 Filesystem [ 2908.547889] XFS (loop2): totally zeroed log [ 2908.556832] XFS (loop5): totally zeroed log [ 2908.561440] XFS (loop2): Failed to read root inode 0x50000000d88, error 22 [ 2908.583035] XFS (loop0): totally zeroed log [ 2908.588837] XFS (loop5): Failed to read root inode 0x190a000000000d88, error 22 09:27:50 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2908.635792] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2908.658917] XFS (loop0): Unmount and run xfs_repair [ 2908.674657] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2908.685796] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2908.698022] XFS (loop1): Mounting V4 Filesystem [ 2908.698291] XFS (loop4): Mounting V4 Filesystem [ 2908.710261] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2908.719445] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2908.728561] XFS (loop1): totally zeroed log [ 2908.733620] XFS (loop1): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2908.743243] XFS (loop4): totally zeroed log [ 2908.756889] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2908.758351] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2908.765975] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2908.787733] XFS (loop1): Unmount and run xfs_repair 09:27:50 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000070000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2908.816524] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:27:50 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0xffffc000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2908.879993] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 2908.894140] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2908.903542] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2908.934904] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2908.945671] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2908.960837] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2908.972051] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2908.982141] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2908.984799] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2909.021654] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:27:50 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfsk', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2909.052732] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2909.057145] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2909.067509] XFS (loop1): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2909.080367] XFS (loop1): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2909.126263] XFS (loop2): Mounting V4 Filesystem [ 2909.133230] XFS (loop1): Failed to read root inode 0xd88, error 117 [ 2909.150605] XFS (loop2): totally zeroed log [ 2909.180509] XFS (loop2): Failed to read root inode 0x70000000d88, error 22 [ 2909.185694] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2909.217200] XFS (loop0): Failed to read root inode 0xd88, error 117 09:27:51 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000090000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:51 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000001035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:51 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0xffff8000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:51 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2909.732343] XFS (loop4): Mounting V4 Filesystem [ 2909.747081] XFS (loop4): totally zeroed log [ 2909.762091] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2909.788235] XFS (loop0): Mounting V4 Filesystem [ 2909.795333] XFS (loop2): Mounting V4 Filesystem [ 2909.799279] XFS (loop0): totally zeroed log [ 2909.814073] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2909.832787] XFS (loop2): totally zeroed log [ 2909.850833] XFS (loop2): Failed to read root inode 0x90000000d88, error 22 [ 2909.866108] XFS (loop0): Unmount and run xfs_repair [ 2909.888671] XFS (loop0): First 128 bytes of corrupted metadata buffer: 09:27:51 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2909.926222] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2909.953610] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:27:51 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0xffffc000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2909.989959] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2910.030935] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2910.054299] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2910.076751] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2910.086328] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2910.095537] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2910.104909] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 09:27:51 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c19000000000000000400000a0000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:51 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2910.177932] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2910.206415] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2910.275915] XFS (loop4): Mounting V4 Filesystem [ 2910.294291] XFS (loop4): totally zeroed log [ 2910.306840] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 09:27:52 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000002035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:52 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x80', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2910.478656] XFS (loop2): Mounting V4 Filesystem [ 2910.495599] XFS (loop2): totally zeroed log [ 2910.515566] XFS (loop2): Failed to read root inode 0xa0000000d88, error 22 09:27:52 executing program 1: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001003f00000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:52 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0xffffc000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2910.823505] XFS (loop0): Mounting V4 Filesystem 09:27:52 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c19000000000000000400000b0000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2910.862361] XFS (loop0): totally zeroed log [ 2910.875839] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 09:27:52 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2910.914079] XFS (loop0): Unmount and run xfs_repair [ 2910.926622] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2910.933302] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2910.960230] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2910.970540] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2910.983468] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2910.993111] XFS (loop1): Mounting V4 Filesystem [ 2910.994784] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2911.007840] XFS (loop1): totally zeroed log [ 2911.015868] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2911.024672] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2911.053613] XFS (loop1): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2911.058604] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2911.071964] XFS (loop1): Unmount and run xfs_repair [ 2911.077332] XFS (loop1): First 128 bytes of corrupted metadata buffer: [ 2911.084413] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2911.093359] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2911.101858] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2911.110277] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2911.142552] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2911.158283] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2911.166460] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2911.215687] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2911.231800] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2911.240969] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2911.249435] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2911.267706] XFS (loop2): Mounting V4 Filesystem [ 2911.283439] XFS (loop1): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 09:27:53 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs?', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:53 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000003035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2911.321899] XFS (loop2): totally zeroed log [ 2911.340493] XFS (loop2): Failed to read root inode 0xb0000000d88, error 22 [ 2911.362878] XFS (loop1): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 09:27:53 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:53 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x3f000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2911.422353] XFS (loop1): Failed to read root inode 0xd88, error 117 09:27:53 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 09:27:53 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c19000000000000000400000e0000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2911.820783] XFS (loop0): Mounting V4 Filesystem [ 2911.835535] XFS (loop0): totally zeroed log [ 2911.844234] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2911.854430] XFS (loop0): Unmount and run xfs_repair [ 2911.868007] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2911.875349] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2911.902379] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2911.911149] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:27:53 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2911.928662] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2911.968502] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:27:53 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x3f000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2911.984482] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2912.009247] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2912.024879] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:27:53 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:53 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) socket$unix(0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) [ 2912.134535] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2912.182998] XFS (loop2): Mounting V4 Filesystem [ 2912.234029] XFS (loop2): totally zeroed log [ 2912.246378] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2912.254912] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2912.302539] XFS (loop2): Failed to read root inode 0xe0000000d88, error 22 [ 2912.390398] XFS (loop4): Mounting V4 Filesystem [ 2912.430591] XFS (loop4): totally zeroed log 09:27:54 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000004035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:54 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040020100000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2912.475251] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 09:27:54 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2912.881095] XFS (loop2): Mounting V4 Filesystem [ 2912.897738] XFS (loop2): totally zeroed log [ 2912.907421] XFS (loop4): Mounting V4 Filesystem [ 2912.918041] XFS (loop2): Failed to read root inode 0x20100000000d88, error 22 [ 2912.931777] XFS (loop0): Mounting V4 Filesystem [ 2912.932338] XFS (loop4): totally zeroed log [ 2912.947167] XFS (loop0): totally zeroed log [ 2912.958990] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2912.971830] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2913.004060] XFS (loop0): Unmount and run xfs_repair 09:27:54 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2913.029380] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2913.059289] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:27:54 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2913.084592] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2913.106622] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2913.123897] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:27:54 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000200000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2913.131852] attempt to access beyond end of device [ 2913.142804] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2913.143561] loop5: rw=1, want=130, limit=112 [ 2913.160079] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2913.166506] buffer_io_error: 38 callbacks suppressed [ 2913.166515] Buffer I/O error on dev loop5, logical block 129, lost async page write [ 2913.177327] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2913.187379] attempt to access beyond end of device [ 2913.194446] loop5: rw=1, want=131, limit=112 [ 2913.202954] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2913.203108] Buffer I/O error on dev loop5, logical block 130, lost async page write [ 2913.221907] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 09:27:54 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x13000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2913.235026] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2913.237143] attempt to access beyond end of device [ 2913.245507] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2913.256128] attempt to access beyond end of device [ 2913.261493] loop1: rw=1, want=130, limit=112 [ 2913.266230] Buffer I/O error on dev loop1, logical block 129, lost async page write [ 2913.276037] loop5: rw=1, want=132, limit=112 [ 2913.283566] attempt to access beyond end of device [ 2913.286363] Buffer I/O error on dev loop5, logical block 131, lost async page write [ 2913.289906] loop1: rw=1, want=131, limit=112 [ 2913.297025] attempt to access beyond end of device [ 2913.297038] loop5: rw=1, want=133, limit=112 [ 2913.297051] Buffer I/O error on dev loop5, logical block 132, lost async page write [ 2913.297078] attempt to access beyond end of device [ 2913.297088] loop5: rw=1, want=142, limit=112 [ 2913.297100] Buffer I/O error on dev loop5, logical block 141, lost async page write [ 2913.297146] attempt to access beyond end of device [ 2913.306610] Buffer I/O error on dev loop1, logical block 130, lost async page write [ 2913.311261] loop5: rw=1, want=143, limit=112 [ 2913.324061] attempt to access beyond end of device [ 2913.336615] loop1: rw=1, want=132, limit=112 [ 2913.354573] Buffer I/O error on dev loop1, logical block 131, lost async page write [ 2913.358770] Buffer I/O error on dev loop5, logical block 142, lost async page write [ 2913.364127] attempt to access beyond end of device [ 2913.371098] attempt to access beyond end of device [ 2913.384467] loop1: rw=1, want=133, limit=112 [ 2913.389242] loop5: rw=1, want=144, limit=112 [ 2913.398240] Buffer I/O error on dev loop5, logical block 143, lost async page write [ 2913.406230] attempt to access beyond end of device [ 2913.424399] attempt to access beyond end of device [ 2913.426063] loop5: rw=1, want=145, limit=112 [ 2913.439663] loop1: rw=1, want=142, limit=112 [ 2913.440276] attempt to access beyond end of device [ 2913.479450] loop5: rw=1, want=537, limit=112 [ 2913.481081] attempt to access beyond end of device [ 2913.484309] attempt to access beyond end of device [ 2913.501057] loop5: rw=1, want=566, limit=112 [ 2913.513097] loop1: rw=1, want=143, limit=112 [ 2913.530083] attempt to access beyond end of device 09:27:55 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2913.550822] attempt to access beyond end of device [ 2913.554010] loop5: rw=1, want=567, limit=112 [ 2913.556110] loop1: rw=1, want=144, limit=112 [ 2913.570850] attempt to access beyond end of device [ 2913.571722] attempt to access beyond end of device [ 2913.575790] loop1: rw=1, want=145, limit=112 [ 2913.588794] loop5: rw=1, want=568, limit=112 [ 2913.593395] attempt to access beyond end of device [ 2913.598786] loop5: rw=1, want=569, limit=112 [ 2913.603440] attempt to access beyond end of device [ 2913.613251] loop5: rw=1, want=590, limit=112 [ 2913.623684] attempt to access beyond end of device [ 2913.629391] attempt to access beyond end of device [ 2913.634334] loop1: rw=1, want=1817, limit=112 [ 2913.635420] attempt to access beyond end of device [ 2913.645587] loop5: rw=1, want=591, limit=112 [ 2913.651911] attempt to access beyond end of device [ 2913.657364] loop5: rw=1, want=592, limit=112 [ 2913.660612] loop1: rw=1, want=1846, limit=112 [ 2913.667720] attempt to access beyond end of device [ 2913.674101] loop5: rw=1, want=593, limit=112 [ 2913.677097] attempt to access beyond end of device [ 2913.679700] attempt to access beyond end of device 09:27:55 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000005035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2913.713777] loop1: rw=1, want=1847, limit=112 [ 2913.731371] attempt to access beyond end of device [ 2913.736756] XFS (loop2): Mounting V4 Filesystem [ 2913.757868] loop1: rw=1, want=1848, limit=112 [ 2913.767837] XFS (loop2): totally zeroed log [ 2913.772597] XFS (loop2): Failed to read root inode 0x200000000d88, error 22 [ 2913.773552] loop5: rw=1, want=642, limit=112 [ 2913.782822] attempt to access beyond end of device [ 2913.804184] attempt to access beyond end of device [ 2913.809411] loop5: rw=1, want=643, limit=112 [ 2913.813972] attempt to access beyond end of device [ 2913.835796] loop1: rw=1, want=1849, limit=112 [ 2913.839990] loop5: rw=1, want=644, limit=112 [ 2913.859874] attempt to access beyond end of device [ 2913.865300] attempt to access beyond end of device [ 2913.881694] loop1: rw=1, want=1870, limit=112 [ 2913.886232] attempt to access beyond end of device [ 2913.887095] loop5: rw=1, want=645, limit=112 [ 2913.891817] loop1: rw=1, want=1871, limit=112 [ 2913.896044] attempt to access beyond end of device [ 2913.900644] attempt to access beyond end of device [ 2913.912339] loop5: rw=1, want=654, limit=112 [ 2913.914101] loop1: rw=1, want=1872, limit=112 [ 2913.921179] attempt to access beyond end of device [ 2913.923786] attempt to access beyond end of device [ 2913.931493] loop5: rw=1, want=655, limit=112 [ 2913.931569] loop1: rw=1, want=1873, limit=112 [ 2913.941164] attempt to access beyond end of device [ 2913.946104] loop1: rw=1, want=1922, limit=112 [ 2913.951208] attempt to access beyond end of device [ 2913.956858] attempt to access beyond end of device [ 2913.961768] loop1: rw=1, want=1923, limit=112 [ 2913.964895] loop5: rw=1, want=656, limit=112 09:27:55 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0xffffffff) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2913.990610] attempt to access beyond end of device [ 2913.996623] attempt to access beyond end of device [ 2914.017452] loop5: rw=1, want=657, limit=112 [ 2914.027429] loop1: rw=1, want=1924, limit=112 [ 2914.039451] attempt to access beyond end of device [ 2914.044654] attempt to access beyond end of device [ 2914.051909] XFS (loop4): Mounting V4 Filesystem [ 2914.053561] loop5: rw=1, want=4745, limit=112 [ 2914.071257] loop1: rw=1, want=1925, limit=112 [ 2914.078845] attempt to access beyond end of device [ 2914.105470] loop1: rw=1, want=1934, limit=112 [ 2914.105487] XFS (loop0): Mounting V4 Filesystem [ 2914.118890] XFS (loop4): totally zeroed log [ 2914.123893] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2914.135246] XFS (loop0): totally zeroed log [ 2914.140323] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2914.155667] attempt to access beyond end of device 09:27:55 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040010200000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2914.191770] loop1: rw=1, want=1935, limit=112 [ 2914.198072] XFS (loop0): Unmount and run xfs_repair [ 2914.217113] attempt to access beyond end of device [ 2914.217654] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2914.246333] loop1: rw=1, want=1936, limit=112 [ 2914.250900] attempt to access beyond end of device [ 2914.255839] loop1: rw=1, want=1937, limit=112 [ 2914.320982] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2914.332739] attempt to access beyond end of device [ 2914.339412] loop1: rw=1, want=6033, limit=112 [ 2914.349596] attempt to access beyond end of device [ 2914.352859] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2914.355090] loop1: rw=1, want=7817, limit=112 09:27:56 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2914.417527] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2914.446410] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2914.530455] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2914.551711] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2914.609730] XFS (loop2): Mounting V4 Filesystem [ 2914.621472] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2914.645248] XFS (loop2): totally zeroed log [ 2914.668891] XFS (loop2): Failed to read root inode 0x10200000000d88, error 22 [ 2914.684726] XFS (loop4): Mounting V4 Filesystem [ 2914.696599] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2914.710459] XFS (loop4): totally zeroed log [ 2914.726779] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2914.749459] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2914.791042] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2914.842431] XFS (loop0): Failed to read root inode 0xd88, error 117 09:27:56 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c19000000000000000400003f0000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:56 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000006035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:56 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2915.142531] XFS (loop2): Mounting V4 Filesystem [ 2915.177256] XFS (loop2): totally zeroed log 09:27:56 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x13000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2915.220273] XFS (loop2): Failed to read root inode 0x3f0000000d88, error 22 [ 2915.279974] XFS (loop4): Mounting V4 Filesystem [ 2915.285505] XFS (loop0): Mounting V4 Filesystem [ 2915.294087] XFS (loop4): totally zeroed log [ 2915.294991] XFS (loop0): totally zeroed log [ 2915.305781] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2915.321721] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 09:27:57 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0xf000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:57 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2915.343844] XFS (loop0): Unmount and run xfs_repair [ 2915.349355] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2915.356248] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2915.363017] attempt to access beyond end of device [ 2915.364764] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2915.370939] loop5: rw=1, want=130, limit=112 [ 2915.377972] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2915.401403] attempt to access beyond end of device [ 2915.414725] loop5: rw=1, want=131, limit=112 [ 2915.415799] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2915.427650] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2915.430720] attempt to access beyond end of device [ 2915.435965] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2915.450995] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2915.495946] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2915.500157] loop5: rw=1, want=132, limit=112 [ 2915.519928] attempt to access beyond end of device [ 2915.525032] loop5: rw=1, want=133, limit=112 [ 2915.532255] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2915.538449] attempt to access beyond end of device [ 2915.578694] loop5: rw=1, want=142, limit=112 [ 2915.582541] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2915.614400] attempt to access beyond end of device 09:27:57 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000400000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2915.634962] XFS (loop0): Failed to read root inode 0xd88, error 117 [ 2915.641832] loop5: rw=1, want=143, limit=112 [ 2915.668217] attempt to access beyond end of device 09:27:57 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2915.691303] loop5: rw=1, want=144, limit=112 [ 2915.706686] attempt to access beyond end of device [ 2915.720444] loop5: rw=1, want=145, limit=112 [ 2915.726205] attempt to access beyond end of device [ 2915.746057] loop5: rw=1, want=601, limit=112 [ 2915.754587] attempt to access beyond end of device [ 2915.777509] loop5: rw=1, want=630, limit=112 [ 2915.785204] attempt to access beyond end of device [ 2915.795332] loop5: rw=1, want=631, limit=112 [ 2915.801363] attempt to access beyond end of device [ 2915.811279] loop5: rw=1, want=632, limit=112 [ 2915.832291] attempt to access beyond end of device [ 2915.837789] loop5: rw=1, want=633, limit=112 [ 2915.842380] attempt to access beyond end of device [ 2915.854113] loop5: rw=1, want=654, limit=112 [ 2915.863055] attempt to access beyond end of device [ 2915.874757] loop5: rw=1, want=655, limit=112 [ 2915.897287] attempt to access beyond end of device [ 2915.908247] loop5: rw=1, want=656, limit=112 [ 2915.915612] attempt to access beyond end of device [ 2915.940578] loop5: rw=1, want=657, limit=112 [ 2915.966467] attempt to access beyond end of device [ 2915.988889] loop5: rw=1, want=706, limit=112 [ 2916.002802] attempt to access beyond end of device [ 2916.014899] loop5: rw=1, want=707, limit=112 [ 2916.025367] attempt to access beyond end of device 09:27:57 executing program 0: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000008035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2916.042842] XFS (loop4): Mounting V4 Filesystem [ 2916.057972] XFS (loop2): Mounting V4 Filesystem [ 2916.082531] loop5: rw=1, want=708, limit=112 [ 2916.084277] XFS (loop4): totally zeroed log 09:27:57 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2916.095541] attempt to access beyond end of device [ 2916.113111] XFS (loop2): totally zeroed log [ 2916.122391] XFS (loop2): Failed to read root inode 0x400000000d88, error 22 [ 2916.128094] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2916.143638] loop5: rw=1, want=709, limit=112 [ 2916.152205] attempt to access beyond end of device [ 2916.160391] loop5: rw=1, want=718, limit=112 [ 2916.165343] attempt to access beyond end of device [ 2916.193114] loop5: rw=1, want=719, limit=112 [ 2916.205235] attempt to access beyond end of device [ 2916.210633] loop5: rw=1, want=720, limit=112 [ 2916.215388] attempt to access beyond end of device [ 2916.231320] XFS (loop0): Mounting V4 Filesystem [ 2916.233082] loop5: rw=1, want=721, limit=112 [ 2916.241387] XFS (loop0): log size 2150998016 bytes too large, maximum size is 2136997888 bytes [ 2916.257719] XFS (loop0): Log size out of supported range. [ 2916.270744] XFS (loop0): Continuing onwards, but if log hangs are experienced then please report this message in the bug report. [ 2916.285525] XFS (loop0): totally zeroed log [ 2916.344014] attempt to access beyond end of device 09:27:58 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c19000000000000000400c0ed0000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:58 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2916.366853] loop5: rw=1, want=3953, limit=112 [ 2916.383523] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x560, xfs_agi block 0x2 [ 2916.419419] XFS (loop0): Unmount and run xfs_repair [ 2916.445563] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 2916.497025] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 09:27:58 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x13000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2916.540415] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2916.572624] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2916.581470] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2916.590243] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2916.599308] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2916.609634] XFS (loop4): Mounting V4 Filesystem [ 2916.615422] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2916.629763] XFS (loop4): totally zeroed log [ 2916.634565] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2916.643432] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2916.659631] XFS (loop2): Mounting V4 Filesystem [ 2916.700455] XFS (loop2): totally zeroed log [ 2916.704908] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 2916.729287] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 2916.743401] XFS (loop2): Failed to read root inode 0xc0ed0000000d88, error 22 [ 2916.764786] XFS (loop0): Failed to read root inode 0xd88, error 117 09:27:58 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2917.040785] XFS (loop2): Mounting V4 Filesystem [ 2917.051660] XFS (loop2): AIL initialisation failed: error -12 [ 2917.135483] XFS (loop2): log mount failed 09:27:58 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:58 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000004000fff0000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2917.223178] XFS (loop4): Mounting V4 Filesystem [ 2917.231526] XFS (loop4): totally zeroed log [ 2917.239594] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 09:27:59 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c19000000000000c0000000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 09:27:59 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) socket$unix(0x1, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x5000000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x800, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001540)=ANY=[@ANYBLOB="ffff0100720360c13fdf69b98816eb0b109a7bbc50b6f511caf2b1c065b97658dc9a76a4fc3c97c7d0638dd40db702cfc074bdf55d5d5866173b2582ace8aa28925f5e789acc2603e52ad88efde9d311487328d69471ee0000000000080000d6f097b0e918d1ef78b2163fc68b01f5467e855f8b1b11cf3be55fdd0794f16d2216ba652dc7f488cb1b6cc95429f56488d10db661f963444af31c242f89b9a00a1055cafb31aabf461e43cdd701a650611933742075254d0e2fb37f52a4a393e962fb2895eb584a9a5e465e2ad92e6753328aee343a88000000000000000000000000000000"], 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:27:59 executing program 4: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c190000000000000002189a000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2917.708769] XFS (loop2): Mounting V4 Filesystem [ 2917.767886] XFS (loop2): totally zeroed log [ 2917.784318] XFS (loop2): Failed to read root inode 0xfff0000000d88, error 22 [ 2917.942391] XFS (loop4): Mounting V4 Filesystem 09:27:59 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000400000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) [ 2917.963797] XFS (loop4): totally zeroed log [ 2917.973784] XFS (loop4): Failed to read root inode 0x189a000000000d88, error 22 [ 2918.290222] XFS (loop5): Mounting V4 Filesystem [ 2918.305192] attempt to access beyond end of device [ 2918.316164] loop5: rw=4096, want=393217, limit=32768 [ 2918.325418] XFS (loop2): Mounting V4 Filesystem [ 2918.327354] XFS (loop5): metadata I/O error in "xlog_bread_noalign" at daddr 0x60000 len 1 error 5 [ 2918.351989] XFS (loop5): empty log check failed [ 2918.352568] XFS (loop2): totally zeroed log [ 2918.361418] XFS (loop5): log mount/recovery failed: error -5 [ 2918.373467] XFS (loop2): Failed to read root inode 0x400000d88, error 22 [ 2918.403630] XFS (loop5): log mount failed