000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:45:36 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673e4", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 585.122613] XFS (loop2): device supports 512 byte sectors (not 0) 00:45:36 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667301", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:45:36 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 585.748388] XFS (loop1): device supports 512 byte sectors (not 0) [ 585.754902] XFS (loop4): SB sanity check failed [ 585.759785] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 585.849527] XFS (loop4): Unmount and run xfs_repair [ 585.877532] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 585.906283] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 00:45:36 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 586.010537] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 586.060814] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 586.124213] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 586.174763] XFS (loop5): Mounting V4 Filesystem [ 586.202221] XFS (loop5): totally zeroed log [ 586.233482] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 586.421822] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 586.463623] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 586.573801] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 586.700418] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00:45:37 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 586.751507] XFS (loop4): SB validate failed with error -117. 00:45:37 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673ca", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:45:37 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\a', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 587.260539] kauditd_printk_skb: 191 callbacks suppressed [ 587.260555] audit: type=1400 audit(1542156338.147:7119): avc: denied { map } for pid=23800 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:45:38 executing program 0: write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 587.475390] audit: type=1400 audit(1542156338.157:7120): avc: denied { map } for pid=23798 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:45:38 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 587.662894] audit: type=1400 audit(1542156338.157:7121): avc: denied { map } for pid=23798 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 587.804141] XFS (loop1): device supports 512 byte sectors (not 0) [ 587.864250] audit: type=1400 audit(1542156338.227:7122): avc: denied { map } for pid=23796 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 588.060470] audit: type=1400 audit(1542156338.227:7123): avc: denied { map } for pid=23796 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:45:39 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 588.249957] audit: type=1400 audit(1542156338.227:7124): avc: denied { map } for pid=23800 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 588.336564] XFS (loop5): Mounting V4 Filesystem [ 588.362956] XFS (loop5): totally zeroed log [ 588.395099] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 588.468739] audit: type=1400 audit(1542156338.237:7125): avc: denied { map } for pid=23800 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 588.642946] audit: type=1400 audit(1542156338.297:7126): avc: denied { map } for pid=23798 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 588.722612] 9pnet: Insufficient options for proto=fd 00:45:39 executing program 0: write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 588.846007] audit: type=1400 audit(1542156338.297:7127): avc: denied { map } for pid=23798 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:45:39 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:45:39 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsN', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:45:39 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667304", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 589.080323] audit: type=1400 audit(1542156338.507:7128): avc: denied { map } for pid=23807 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 589.209834] XFS (loop2): device supports 512 byte sectors (not 0) 00:45:40 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\v', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 589.533555] XFS (loop1): device supports 512 byte sectors (not 0) 00:45:40 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="786673ea", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 589.890764] 9pnet: Insufficient options for proto=fd 00:45:40 executing program 0: write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 590.174617] XFS (loop3): Mounting V4 Filesystem [ 590.227432] XFS (loop3): totally zeroed log [ 590.305232] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:45:41 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:45:42 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:45:42 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673e4", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 591.552803] 9pnet: Insufficient options for proto=fd 00:45:42 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="7866738c", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:45:42 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 592.063863] XFS (loop3): Mounting V4 Filesystem [ 592.121690] XFS (loop3): totally zeroed log [ 592.158775] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:45:43 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="7866730f", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 592.281634] kauditd_printk_skb: 193 callbacks suppressed [ 592.281650] audit: type=1400 audit(1542156343.167:7322): avc: denied { map } for pid=23917 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 592.555496] audit: type=1400 audit(1542156343.207:7323): avc: denied { map } for pid=23917 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:45:43 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 592.738700] XFS (loop4): SB sanity check failed [ 592.753036] audit: type=1400 audit(1542156343.217:7324): avc: denied { map } for pid=23930 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 592.779567] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 592.800375] XFS (loop4): Unmount and run xfs_repair [ 592.816141] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 592.894920] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 592.970413] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 593.010441] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 00:45:44 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 593.061449] audit: type=1400 audit(1542156343.257:7325): avc: denied { map } for pid=23917 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 593.101356] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 593.190393] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 593.231237] audit: type=1400 audit(1542156343.287:7326): avc: denied { map } for pid=23917 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:45:44 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsI', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 593.273672] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 593.350313] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 593.390487] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 593.437217] XFS (loop4): SB validate failed with error -117. [ 593.448034] audit: type=1400 audit(1542156343.307:7327): avc: denied { map } for pid=23936 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 593.553060] audit: audit_backlog=65 > audit_backlog_limit=64 [ 593.601208] audit: type=1400 audit(1542156343.347:7328): avc: denied { map } for pid=23930 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 593.633706] audit: type=1400 audit(1542156343.347:7329): avc: denied { map } for pid=23930 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 593.647999] audit: audit_lost=43 audit_rate_limit=0 audit_backlog_limit=64 00:45:44 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673d0", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:45:44 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsH', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:45:45 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:45:45 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 594.649851] XFS (loop3): Mounting V4 Filesystem [ 594.690354] XFS (loop3): totally zeroed log [ 594.756065] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:45:46 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 595.837391] XFS (loop1): device supports 512 byte sectors (not 0) 00:45:46 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs>', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:45:47 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs(', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:45:47 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:45:47 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[], 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:45:47 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs"', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 596.748391] XFS (loop3): Mounting V4 Filesystem [ 596.824047] XFS (loop3): totally zeroed log [ 596.870586] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:45:48 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 597.182270] XFS (loop1): device supports 512 byte sectors (not 0) [ 597.298605] kauditd_printk_skb: 207 callbacks suppressed [ 597.298621] audit: type=1400 audit(1542156348.177:7536): avc: denied { map } for pid=24036 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:45:48 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[], 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 597.501592] audit: type=1400 audit(1542156348.207:7537): avc: denied { map } for pid=24044 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:45:48 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 597.703057] audit: type=1400 audit(1542156348.217:7538): avc: denied { map } for pid=24036 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:45:48 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667380", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 597.845786] audit: type=1400 audit(1542156348.247:7539): avc: denied { map } for pid=24044 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 598.032783] audit: type=1400 audit(1542156348.257:7540): avc: denied { map } for pid=24044 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:45:49 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 598.234670] audit: type=1400 audit(1542156348.267:7541): avc: denied { map } for pid=24057 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 598.434577] audit: type=1400 audit(1542156348.277:7542): avc: denied { map } for pid=24057 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:45:49 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 598.572227] audit: type=1400 audit(1542156348.297:7543): avc: denied { map } for pid=24057 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 598.625444] XFS (loop3): Mounting V4 Filesystem [ 598.680875] audit: audit_backlog=65 > audit_backlog_limit=64 [ 598.686848] XFS (loop3): totally zeroed log [ 598.691804] audit: audit_backlog=65 > audit_backlog_limit=64 [ 598.716252] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:45:49 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[], 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 598.919499] XFS (loop1): device supports 512 byte sectors (not 0) 00:45:50 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:45:50 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 599.677597] XFS (loop2): device supports 512 byte sectors (not 0) 00:45:50 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:45:50 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673e4", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:45:50 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs`', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 600.331304] XFS (loop4): SB sanity check failed [ 600.340356] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 600.360328] XFS (loop4): Unmount and run xfs_repair [ 600.365377] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 600.450398] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 600.500712] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 600.578656] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 600.677462] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 600.734639] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 600.798855] XFS (loop3): Mounting V4 Filesystem [ 600.818516] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 600.830455] XFS (loop3): totally zeroed log [ 600.852471] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 600.878902] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 600.900516] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 600.923697] XFS (loop4): SB validate failed with error -117. 00:45:52 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 601.216006] XFS (loop1): device supports 512 byte sectors (not 0) 00:45:52 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:45:52 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:45:52 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:45:52 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:45:53 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsX', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 602.553434] XFS (loop4): SB sanity check failed [ 602.558321] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 602.624113] XFS (loop4): Unmount and run xfs_repair [ 602.649390] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 602.695572] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 00:45:53 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 602.750370] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 602.776280] XFS (loop3): Mounting V4 Filesystem [ 602.790428] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 602.802797] XFS (loop1): device supports 512 byte sectors (not 0) [ 602.823872] XFS (loop3): totally zeroed log [ 602.859962] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 602.879251] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 602.927364] XFS (loop2): device supports 512 byte sectors (not 0) [ 602.955693] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 00:45:53 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="786673d0", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 603.070468] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 603.091121] kauditd_printk_skb: 219 callbacks suppressed [ 603.091136] audit: type=1400 audit(1542156353.977:7744): avc: denied { map } for pid=24223 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:45:54 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:45:54 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 603.158741] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 603.258588] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 603.298913] audit: type=1400 audit(1542156353.977:7745): avc: denied { map } for pid=24223 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 603.400495] XFS (loop4): SB validate failed with error -117. [ 603.461855] audit: type=1400 audit(1542156353.977:7746): avc: denied { map } for pid=24223 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:45:54 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 603.624322] audit: type=1400 audit(1542156354.007:7747): avc: denied { map } for pid=24223 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 603.791476] audit: type=1400 audit(1542156354.097:7748): avc: denied { map } for pid=24223 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:45:54 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="14000000"], 0x4) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 603.984041] audit: type=1400 audit(1542156354.117:7749): avc: denied { map } for pid=24226 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:45:55 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 604.126973] audit: audit_backlog=65 > audit_backlog_limit=64 [ 604.137584] audit: type=1400 audit(1542156354.117:7750): avc: denied { map } for pid=24226 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 604.168798] audit: audit_lost=51 audit_rate_limit=0 audit_backlog_limit=64 [ 604.236789] audit: backlog limit exceeded [ 604.444323] XFS (loop3): Mounting V4 Filesystem [ 604.485371] XFS (loop3): totally zeroed log [ 604.529230] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 604.759699] XFS (loop2): device supports 512 byte sectors (not 0) 00:45:55 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 605.099920] XFS (loop4): SB sanity check failed [ 605.107573] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 00:45:56 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 605.171766] XFS (loop4): Unmount and run xfs_repair [ 605.205984] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 605.252407] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 605.295677] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00:45:56 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667303", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 605.379349] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 605.476580] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 605.574201] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 605.655780] XFS (loop5): Mounting V4 Filesystem [ 605.696069] XFS (loop5): totally zeroed log [ 605.704105] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 605.739322] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 605.760959] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 605.806193] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 605.870323] XFS (loop4): SB validate failed with error -117. 00:45:56 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:45:56 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="14000000"], 0x4) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:45:56 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667303", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 606.518161] XFS (loop3): Mounting V4 Filesystem [ 606.595794] XFS (loop3): totally zeroed log [ 606.612852] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:45:57 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 606.937920] XFS (loop1): device supports 512 byte sectors (not 0) 00:45:58 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="14000000"], 0x4) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:45:58 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:45:58 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 607.567795] XFS (loop5): Mounting V4 Filesystem [ 607.622087] XFS (loop5): totally zeroed log [ 607.670308] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:45:58 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="7866730f", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:45:59 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 608.158508] kauditd_printk_skb: 190 callbacks suppressed [ 608.158524] audit: type=1400 audit(1542156359.037:7941): avc: denied { map } for pid=24343 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 608.644788] XFS (loop3): Mounting V4 Filesystem [ 608.718051] XFS (loop3): totally zeroed log [ 608.740115] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 608.832521] audit: type=1400 audit(1542156359.717:7942): avc: denied { map } for pid=24373 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:45:59 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ff"], 0x6) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 608.950301] audit: type=1400 audit(1542156359.747:7943): avc: denied { map } for pid=24373 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 608.978650] XFS (loop1): device supports 512 byte sectors (not 0) [ 609.026837] XFS (loop2): device supports 512 byte sectors (not 0) [ 609.093763] audit: type=1400 audit(1542156359.747:7944): avc: denied { map } for pid=24373 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:46:00 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 609.224183] audit: type=1400 audit(1542156359.747:7945): avc: denied { map } for pid=24373 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:46:00 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:46:00 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667301", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 609.541301] audit: type=1400 audit(1542156359.817:7946): avc: denied { map } for pid=24373 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 609.581335] audit: type=1400 audit(1542156359.847:7947): avc: denied { map } for pid=24381 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 609.682880] audit: type=1400 audit(1542156359.867:7948): avc: denied { map } for pid=24381 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 609.739998] XFS (loop5): Mounting V4 Filesystem [ 609.769131] XFS (loop5): totally zeroed log [ 609.797386] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 609.925453] audit: type=1400 audit(1542156359.877:7950): avc: denied { map } for pid=24373 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 610.156216] audit: type=1400 audit(1542156359.877:7949): avc: denied { map } for pid=24379 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:46:01 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:46:01 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:46:01 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ff"], 0x6) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 610.679372] XFS (loop1): device supports 512 byte sectors (not 0) [ 610.726868] XFS (loop3): Mounting V4 Filesystem [ 610.762352] XFS (loop3): totally zeroed log [ 610.816051] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:46:01 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:46:02 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:46:02 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ff"], 0x6) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:46:02 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 611.681493] XFS (loop5): Mounting V4 Filesystem [ 611.704632] XFS (loop5): totally zeroed log [ 611.750031] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 611.768485] XFS (loop4): SB sanity check failed [ 611.783901] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 611.850496] XFS (loop4): Unmount and run xfs_repair [ 611.858792] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 611.991064] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 611.999265] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 612.061364] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 612.073960] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ 00:46:03 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsL', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 612.113979] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 612.122394] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 612.130662] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 612.138819] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 612.199223] XFS (loop4): SB validate failed with error -117. [ 612.353247] XFS (loop1): device supports 512 byte sectors (not 0) 00:46:03 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 612.525899] XFS (loop3): Mounting V4 Filesystem [ 612.593422] XFS (loop3): totally zeroed log [ 612.603908] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:46:03 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 612.881224] XFS (loop2): device supports 512 byte sectors (not 0) 00:46:03 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:46:03 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs#', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:46:04 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfst', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 613.423028] kauditd_printk_skb: 171 callbacks suppressed [ 613.423044] audit: type=1400 audit(1542156364.307:8122): avc: denied { map } for pid=24529 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 613.590278] audit: type=1400 audit(1542156364.347:8123): avc: denied { map } for pid=24529 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 613.770319] audit: type=1400 audit(1542156364.347:8124): avc: denied { map } for pid=24529 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 613.800683] XFS (loop4): SB sanity check failed [ 613.805401] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 613.860688] XFS (loop4): Unmount and run xfs_repair [ 613.865753] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 613.961963] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 613.970167] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 613.978503] audit: type=1400 audit(1542156364.347:8125): avc: denied { map } for pid=24529 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 614.082421] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 614.098260] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 614.131186] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 614.143847] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 00:46:05 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 614.230499] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 614.243326] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 614.302705] XFS (loop4): SB validate failed with error -117. [ 614.308801] XFS (loop1): device supports 512 byte sectors (not 0) [ 614.341460] audit: type=1400 audit(1542156364.347:8126): avc: denied { map } for pid=24531 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:46:05 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673ea", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 614.530313] audit: type=1400 audit(1542156364.377:8127): avc: denied { map } for pid=24531 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:46:05 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:46:05 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 614.682991] audit: type=1400 audit(1542156364.397:8128): avc: denied { map } for pid=24531 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 614.850097] audit: audit_backlog=65 > audit_backlog_limit=64 [ 614.868338] audit: audit_backlog=65 > audit_backlog_limit=64 [ 614.925626] audit: type=1400 audit(1542156364.397:8129): avc: denied { map } for pid=24529 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:46:06 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:46:06 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:46:06 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 616.407794] XFS (loop4): SB sanity check failed [ 616.412716] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 616.507440] XFS (loop4): Unmount and run xfs_repair [ 616.542957] XFS (loop4): First 128 bytes of corrupted metadata buffer: 00:46:07 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsL', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 616.599541] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 616.666018] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 616.723366] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 616.742984] XFS (loop2): device supports 512 byte sectors (not 0) [ 616.775283] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 617.032769] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 617.102761] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 617.115431] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 617.131982] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 617.148317] XFS (loop1): device supports 512 byte sectors (not 0) [ 617.154816] XFS (loop4): SB validate failed with error -117. [ 617.190107] XFS (loop3): Mounting V4 Filesystem 00:46:08 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 617.240391] XFS (loop3): AIL initialisation failed: error -12 [ 617.284170] XFS (loop3): log mount failed 00:46:08 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:46:08 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r0, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:46:08 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="7866737f", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:46:08 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 618.433737] kauditd_printk_skb: 206 callbacks suppressed [ 618.433763] audit: type=1400 audit(1542156369.317:8314): avc: denied { map } for pid=24641 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 618.490501] 9pnet: Insufficient options for proto=fd [ 618.602544] audit: type=1400 audit(1542156369.327:8315): avc: denied { map } for pid=24641 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:46:09 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r0, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 618.783475] audit: type=1400 audit(1542156369.347:8316): avc: denied { map } for pid=24642 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:46:09 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 618.946256] XFS (loop2): device supports 512 byte sectors (not 0) [ 618.989270] XFS (loop3): Mounting V4 Filesystem [ 618.990547] audit: type=1400 audit(1542156369.347:8317): avc: denied { map } for pid=24642 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 619.031473] XFS (loop3): totally zeroed log [ 619.038501] XFS (loop4): SB sanity check failed [ 619.043377] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 619.073005] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 619.112397] XFS (loop4): Unmount and run xfs_repair [ 619.150063] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 619.205427] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 619.223432] audit: type=1400 audit(1542156369.377:8318): avc: denied { map } for pid=24642 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:46:10 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 619.289522] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 619.335824] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 619.393797] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 619.403370] audit: type=1400 audit(1542156369.397:8319): avc: denied { map } for pid=24644 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:46:10 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 619.464524] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 619.508887] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 619.580302] audit: type=1400 audit(1542156369.397:8320): avc: denied { map } for pid=24641 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 619.615530] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ 00:46:10 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 619.652298] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 619.680601] XFS (loop4): SB validate failed with error -117. [ 619.711291] audit: type=1400 audit(1542156369.407:8321): avc: denied { map } for pid=24644 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 619.821615] audit: type=1400 audit(1542156369.407:8322): avc: denied { map } for pid=24644 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:46:10 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 619.906496] audit: audit_backlog=65 > audit_backlog_limit=64 [ 619.983464] 9pnet: Insufficient options for proto=fd 00:46:11 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r0, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 620.400414] XFS (loop5): Mounting V4 Filesystem [ 620.456515] XFS (loop5): totally zeroed log [ 620.558933] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 620.705118] XFS (loop2): device supports 512 byte sectors (not 0) 00:46:11 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:46:11 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 621.194755] XFS (loop3): Mounting V4 Filesystem [ 621.260336] XFS (loop3): totally zeroed log [ 621.329943] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 621.538769] XFS (loop1): device supports 512 byte sectors (not 0) 00:46:12 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 621.694420] 9pnet: Insufficient options for proto=fd [ 621.722512] XFS (loop4): SB sanity check failed [ 621.735077] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 00:46:12 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 621.899577] XFS (loop4): Unmount and run xfs_repair [ 621.909307] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 621.960433] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 621.968650] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 621.980118] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 621.991670] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ 00:46:12 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 622.003938] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 622.015419] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 622.026857] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 622.038365] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 622.052821] XFS (loop4): SB validate failed with error -117. 00:46:13 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667303", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 622.527897] XFS (loop5): Mounting V4 Filesystem [ 622.568669] XFS (loop5): totally zeroed log [ 622.594333] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 622.662301] XFS (loop2): device supports 512 byte sectors (not 0) 00:46:13 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:46:13 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 623.227243] 9pnet: Insufficient options for proto=fd [ 623.247833] XFS (loop3): Mounting V4 Filesystem [ 623.272855] XFS (loop3): totally zeroed log [ 623.283375] XFS (loop1): device supports 512 byte sectors (not 0) [ 623.290506] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:46:14 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 623.446552] kauditd_printk_skb: 173 callbacks suppressed [ 623.446568] audit: type=1400 audit(1542156374.327:8485): avc: denied { map } for pid=24799 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 623.601862] audit: type=1400 audit(1542156374.327:8486): avc: denied { map } for pid=24799 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:46:14 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:46:14 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 623.752307] audit: type=1400 audit(1542156374.357:8487): avc: denied { map } for pid=24799 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 623.796086] audit: type=1400 audit(1542156374.417:8488): avc: denied { map } for pid=24799 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 623.887047] audit: type=1400 audit(1542156374.487:8489): avc: denied { map } for pid=24817 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 623.956544] audit: type=1400 audit(1542156374.487:8490): avc: denied { map } for pid=24817 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 624.112907] audit: type=1400 audit(1542156374.517:8491): avc: denied { map } for pid=24817 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 624.148481] audit: type=1400 audit(1542156374.527:8492): avc: denied { map } for pid=24817 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 624.187427] audit: type=1400 audit(1542156374.597:8493): avc: denied { map } for pid=24817 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 624.265218] XFS (loop2): device supports 512 byte sectors (not 0) [ 624.339998] audit: type=1400 audit(1542156374.637:8494): avc: denied { map } for pid=24817 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:46:15 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:46:15 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673e0", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 624.599842] XFS (loop5): Mounting V4 Filesystem [ 624.632385] XFS (loop5): totally zeroed log [ 624.683856] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 624.717769] 9pnet: Insufficient options for proto=fd 00:46:15 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:46:15 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 625.157273] XFS (loop1): device supports 512 byte sectors (not 0) [ 625.345594] XFS (loop3): Mounting V4 Filesystem [ 625.384402] XFS (loop3): totally zeroed log 00:46:16 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\t', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 625.454322] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:46:16 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673d0", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 625.971488] XFS (loop4): SB sanity check failed [ 625.976373] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 626.063108] XFS (loop4): Unmount and run xfs_repair [ 626.076973] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 626.132666] 9pnet: Insufficient options for proto=fd [ 626.155500] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 626.225587] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 626.285554] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 00:46:17 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 626.359159] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 626.451277] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 626.522071] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 626.592741] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 626.685062] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 626.860629] XFS (loop4): SB validate failed with error -117. [ 626.874834] XFS (loop5): Mounting V4 Filesystem 00:46:17 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:46:17 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 627.122421] XFS (loop5): totally zeroed log [ 627.208302] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:46:18 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsH', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:46:18 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="786673ff", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:46:19 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667382", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 628.453027] kauditd_printk_skb: 152 callbacks suppressed [ 628.453043] audit: type=1400 audit(1542156379.337:8647): avc: denied { map } for pid=24924 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:46:19 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 628.537547] XFS (loop2): device supports 512 byte sectors (not 0) [ 628.630290] audit: type=1400 audit(1542156379.347:8648): avc: denied { map } for pid=24923 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 628.867186] audit: type=1400 audit(1542156379.397:8649): avc: denied { map } for pid=24924 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 628.984672] XFS (loop4): SB sanity check failed [ 628.989497] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 629.006565] audit: type=1400 audit(1542156379.437:8650): avc: denied { map } for pid=24924 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 629.084973] XFS (loop4): Unmount and run xfs_repair 00:46:20 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 629.122769] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 629.173429] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 629.203113] audit: type=1400 audit(1542156379.457:8651): avc: denied { map } for pid=24924 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 629.250318] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 629.264174] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 629.286101] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 629.381644] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 629.399991] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 629.452897] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 629.465581] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 629.479264] XFS (loop4): SB validate failed with error -117. [ 629.482643] audit: type=1400 audit(1542156379.567:8652): avc: denied { map } for pid=24924 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 629.592494] audit: type=1400 audit(1542156379.567:8653): avc: denied { map } for pid=24924 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 629.622448] audit: type=1400 audit(1542156379.597:8654): avc: denied { map } for pid=24942 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 629.830429] audit: type=1400 audit(1542156379.617:8655): avc: denied { map } for pid=24942 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:46:20 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 629.970353] audit: type=1400 audit(1542156379.637:8656): avc: denied { map } for pid=24942 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:46:21 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsM', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:46:21 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 00:46:21 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs,', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:46:21 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 630.959985] XFS (loop2): device supports 512 byte sectors (not 0) 00:46:22 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:46:22 executing program 0: r0 = socket$inet(0x2, 0x3, 0x2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000080)=0x3, 0x4) [ 631.871728] XFS (loop4): SB sanity check failed [ 631.876979] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 631.900406] XFS (loop4): Unmount and run xfs_repair [ 631.905615] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 631.950389] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 632.000059] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 632.053640] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 632.094650] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ 00:46:23 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 632.166257] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 632.187741] XFS (loop3): Mounting V4 Filesystem [ 632.240498] XFS (loop3): totally zeroed log [ 632.256429] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 632.310338] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 00:46:23 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 632.483462] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 632.544757] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 632.623851] XFS (loop4): SB validate failed with error -117. 00:46:23 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs~', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:46:23 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667303", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 632.804764] XFS (loop2): device supports 512 byte sectors (not 0) 00:46:24 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x6, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f0000000040), &(0x7f0000000100)=""/108}, 0x18) 00:46:24 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="7866738a", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 633.480542] kauditd_printk_skb: 175 callbacks suppressed [ 633.480558] audit: type=1400 audit(1542156384.367:8832): avc: denied { map } for pid=25050 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 633.640291] audit: type=1400 audit(1542156384.377:8833): avc: denied { map } for pid=25053 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 633.758113] audit: type=1400 audit(1542156384.387:8834): avc: denied { map } for pid=25053 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 633.873050] XFS (loop1): device supports 512 byte sectors (not 0) [ 633.899350] audit: type=1400 audit(1542156384.447:8835): avc: denied { map } for pid=25050 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 633.924062] XFS (loop5): Mounting V4 Filesystem [ 633.964484] XFS (loop5): totally zeroed log [ 633.974594] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 634.041939] audit: type=1400 audit(1542156384.447:8836): avc: denied { map } for pid=25050 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:46:25 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 634.217273] audit: type=1400 audit(1542156384.457:8837): avc: denied { map } for pid=25053 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:46:25 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 634.404969] audit: type=1400 audit(1542156384.477:8838): avc: denied { map } for pid=25053 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 634.554468] audit: type=1400 audit(1542156384.497:8839): avc: denied { map } for pid=25056 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 634.730634] audit: type=1400 audit(1542156384.507:8840): avc: denied { map } for pid=25056 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:46:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x2) io_setup(0x8, &(0x7f0000000200)=0x0) io_submit(r1, 0x1, &(0x7f00000000c0)=[&(0x7f00002a8000)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0xfd28}]) 00:46:25 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667301", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 634.902221] audit: type=1400 audit(1542156384.537:8841): avc: denied { map } for pid=25056 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:46:25 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:46:26 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 635.718762] XFS (loop1): device supports 512 byte sectors (not 0) [ 635.737774] XFS (loop5): Mounting V4 Filesystem [ 635.767152] XFS (loop5): totally zeroed log [ 635.783950] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:46:26 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = accept4(0xffffffffffffffff, &(0x7f00000002c0)=@alg, &(0x7f0000000080)=0x80, 0x80800) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) sendmsg$nl_route(r3, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f00000006c0)=ANY=[@ANYBLOB="000000000000000008000a00060000001800120008000100767469000c000200080001c0e0000002"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x40884) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCSTI(r1, 0x5412, 0x97e) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000004480)) getsockopt$inet6_buf(r2, 0x29, 0x3a, &(0x7f0000000480)=""/89, &(0x7f0000000500)=0x59) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@dev, @in6=@local}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000045c0)=0xe8) getpid() ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup2(r4, r3) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000140)={'team0\x00'}) 00:46:26 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 636.128788] XFS (loop3): Mounting V4 Filesystem 00:46:27 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="786673ff", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 636.175772] XFS (loop3): totally zeroed log [ 636.254768] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 636.536834] XFS (loop2): device supports 512 byte sectors (not 0) 00:46:27 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:46:27 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673ff", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:46:27 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 637.249510] XFS (loop5): Mounting V4 Filesystem [ 637.294243] XFS (loop5): totally zeroed log [ 637.305003] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:46:28 executing program 0: 00:46:28 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 637.965617] XFS (loop3): Mounting V4 Filesystem [ 637.990386] XFS (loop3): totally zeroed log [ 638.043010] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:46:29 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="78667303", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:46:29 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 638.373121] XFS (loop2): device supports 512 byte sectors (not 0) [ 638.527667] kauditd_printk_skb: 242 callbacks suppressed [ 638.527683] audit: type=1400 audit(1542156389.407:9072): avc: denied { map } for pid=25214 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 638.672469] audit: type=1400 audit(1542156389.487:9073): avc: denied { map } for pid=25216 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 638.707545] audit: type=1400 audit(1542156389.487:9074): avc: denied { map } for pid=25214 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 638.737683] audit: type=1400 audit(1542156389.527:9075): avc: denied { map } for pid=25216 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:46:29 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:46:29 executing program 0: [ 638.954803] audit: type=1400 audit(1542156389.587:9076): avc: denied { map } for pid=25215 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:46:29 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 639.170364] audit: type=1400 audit(1542156389.587:9077): avc: denied { map } for pid=25215 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 639.444910] audit: type=1400 audit(1542156389.617:9078): avc: denied { map } for pid=25226 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 639.614637] audit: type=1400 audit(1542156389.617:9079): avc: denied { map } for pid=25226 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 639.801973] audit: type=1400 audit(1542156389.617:9080): avc: denied { map } for pid=25226 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 639.829760] audit: type=1400 audit(1542156389.617:9081): avc: denied { map } for pid=25226 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 639.875222] XFS (loop5): Mounting V4 Filesystem [ 639.911246] XFS (loop5): totally zeroed log [ 639.961989] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:46:30 executing program 0: [ 640.268106] XFS (loop3): Mounting V4 Filesystem [ 640.372659] XFS (loop3): totally zeroed log 00:46:31 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 640.424014] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 640.675316] XFS (loop2): device supports 512 byte sectors (not 0) [ 640.756388] XFS (loop4): SB sanity check failed [ 640.761519] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 00:46:31 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 640.869783] XFS (loop4): Unmount and run xfs_repair [ 640.911338] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 640.966098] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 641.028326] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00:46:31 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 641.080542] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 00:46:32 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="78667301", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:46:32 executing program 0: [ 641.192129] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 641.243693] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 641.287794] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 641.336352] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 641.390653] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 641.447417] XFS (loop4): SB validate failed with error -117. 00:46:32 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673ff", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 642.174455] XFS (loop3): Mounting V4 Filesystem [ 642.216809] XFS (loop3): totally zeroed log [ 642.240458] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 642.297233] XFS (loop5): Mounting V4 Filesystem 00:46:33 executing program 0: [ 642.411372] XFS (loop5): totally zeroed log [ 642.419756] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 642.505028] XFS (loop2): device supports 512 byte sectors (not 0) 00:46:33 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:46:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:46:33 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:46:34 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:46:34 executing program 0: [ 643.555953] kauditd_printk_skb: 162 callbacks suppressed [ 643.555969] audit: type=1400 audit(1542156394.437:9244): avc: denied { map } for pid=25346 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 643.700906] audit: type=1400 audit(1542156394.447:9245): avc: denied { map } for pid=25343 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 643.821231] audit: type=1400 audit(1542156394.477:9246): avc: denied { map } for pid=25342 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 643.962848] audit: type=1400 audit(1542156394.487:9248): avc: denied { map } for pid=25342 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 643.990699] audit: type=1400 audit(1542156394.477:9247): avc: denied { map } for pid=25346 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 644.018507] audit: type=1400 audit(1542156394.507:9249): avc: denied { map } for pid=25343 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:46:35 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 644.220919] audit: type=1400 audit(1542156395.097:9250): avc: denied { map } for pid=25354 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 644.402793] audit: type=1400 audit(1542156395.127:9251): avc: denied { map } for pid=25354 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 644.437780] XFS (loop3): Mounting V4 Filesystem [ 644.477883] XFS (loop3): totally zeroed log [ 644.486837] XFS (loop2): device supports 512 byte sectors (not 0) [ 644.500153] XFS (loop5): Mounting V4 Filesystem [ 644.520479] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 644.551757] XFS (loop5): totally zeroed log [ 644.574210] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 644.623192] audit: type=1400 audit(1542156395.147:9252): avc: denied { map } for pid=25357 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:46:35 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) listen(0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005a00)) stat(&(0x7f0000005ec0)='./file0\x00', &(0x7f0000005f00)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"760000000000000002000000bd6800", 0x43732e5398416f13}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = dup2(r0, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0bc5351, &(0x7f0000000200)={0x7, 0x3, 'client0\x00', 0xffffffff80000006, "98c49be883a183ce", "05f720fcc6c3d9a1577f1410c7d5ae06bf5688e51f79e0ea2a3b47964a86f938", 0x6, 0x3}) 00:46:35 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsl', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 644.773004] audit: type=1400 audit(1542156395.177:9253): avc: denied { map } for pid=25357 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:46:35 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:46:35 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 644.980503] XFS (loop1): device supports 512 byte sectors (not 0) 00:46:36 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs&', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 645.646679] XFS (loop4): SB sanity check failed [ 645.651650] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 645.734587] XFS (loop4): Unmount and run xfs_repair [ 645.774618] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 645.810787] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 645.914692] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 646.045680] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 646.151586] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 646.178774] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 646.196863] XFS (loop5): Mounting V4 Filesystem [ 646.248628] XFS (loop5): totally zeroed log [ 646.260326] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 646.285225] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 646.314493] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 646.373803] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 646.430075] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 646.452258] XFS (loop3): Mounting V4 Filesystem [ 646.504161] XFS (loop3): totally zeroed log [ 646.513596] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 646.530146] XFS (loop4): SB validate failed with error -117. 00:46:37 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="7866739b", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:46:37 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:46:37 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 646.984884] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:46:38 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:46:38 executing program 0: mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x800094, &(0x7f0000000140)) chdir(&(0x7f0000000000)='./file0\x00') r1 = open(&(0x7f0000000200)='./file0\x00', 0x8000000000141042, 0x20) write$P9_RSTATFS(r1, &(0x7f0000000500)={0x43, 0x9, 0x0, {0x0, 0x3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}}, 0x43) write$evdev(0xffffffffffffffff, &(0x7f0000000440), 0x0) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) dup(r0) renameat(r1, &(0x7f0000000240)='./file1\x00', r1, &(0x7f0000000280)='./file0\x00') 00:46:38 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfsL', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 648.039336] XFS (loop4): SB sanity check failed [ 648.045931] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 648.113588] XFS (loop2): device supports 512 byte sectors (not 0) [ 648.170478] XFS (loop4): Unmount and run xfs_repair [ 648.176685] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 648.232190] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 648.260897] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 648.309867] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 648.380572] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ 00:46:39 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 648.469291] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 648.586062] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 648.616358] kauditd_printk_skb: 175 callbacks suppressed [ 648.616375] audit: type=1400 audit(1542156399.497:9429): avc: denied { map } for pid=25495 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 648.740354] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 648.759421] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 648.781763] audit: type=1400 audit(1542156399.547:9430): avc: denied { map } for pid=25494 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 648.809030] audit: type=1400 audit(1542156399.547:9431): avc: denied { map } for pid=25494 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 648.836520] audit: type=1400 audit(1542156399.567:9432): avc: denied { map } for pid=25495 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 648.864750] audit: type=1400 audit(1542156399.637:9433): avc: denied { map } for pid=25494 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 648.904058] XFS (loop3): Mounting V4 Filesystem [ 648.933184] XFS (loop4): SB validate failed with error -117. [ 648.939150] XFS (loop3): totally zeroed log [ 648.972859] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 649.066084] audit: type=1400 audit(1542156399.717:9434): avc: denied { map } for pid=25495 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:46:40 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:46:40 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x20000fff}) [ 649.230865] audit: type=1400 audit(1542156399.797:9435): avc: denied { map } for pid=25495 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 649.306800] audit: type=1400 audit(1542156399.807:9436): avc: denied { map } for pid=25494 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 649.379700] audit: type=1400 audit(1542156399.847:9437): avc: denied { map } for pid=25494 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:46:40 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 649.438469] audit: type=1400 audit(1542156399.927:9438): avc: denied { map } for pid=25494 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:46:40 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:46:41 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:46:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) accept4(0xffffffffffffffff, &(0x7f0000000340)=@ax25, &(0x7f0000000000)=0x80, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={"6c6f0000000002d68900", 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=@setlink={0x34, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, 0x401}, @IFLA_ADDRESS={0xc, 0x1, @remote}]}, 0x34}}, 0x0) [ 650.695928] XFS (loop5): Mounting V4 Filesystem [ 650.706649] XFS (loop2): device supports 512 byte sectors (not 0) [ 650.729641] XFS (loop5): totally zeroed log [ 650.764998] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:46:41 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 651.033481] XFS (loop3): Mounting V4 Filesystem [ 651.080617] XFS (loop3): totally zeroed log [ 651.101944] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 651.139023] XFS (loop4): SB sanity check failed [ 651.150974] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 00:46:42 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 651.210393] XFS (loop4): Unmount and run xfs_repair [ 651.223459] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 651.269291] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 651.334598] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 651.383409] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 651.412502] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ 00:46:42 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 651.555805] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 651.611200] XFS (loop1): device supports 512 byte sectors (not 0) [ 651.655137] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 651.697498] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 651.718834] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 651.750403] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 651.811445] XFS (loop4): SB validate failed with error -117. 00:46:42 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000a00000000000000ff010000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000a00000000000000fe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0000000000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff02000080000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0000000000000000000000000000000000ffffac1414000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000128072962ffd5082de89146b1b1d9491087e6073e1581f5752052411b20ce88daa43a752a82000058b30"], 0x1) [ 651.930159] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 00:46:42 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:46:42 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 652.410156] XFS (loop2): device supports 512 byte sectors (not 0) [ 652.766853] XFS (loop5): Mounting V4 Filesystem 00:46:43 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 652.832236] XFS (loop5): totally zeroed log [ 652.876516] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 652.976184] XFS (loop3): Mounting V4 Filesystem [ 653.008746] XFS (loop3): totally zeroed log [ 653.036285] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:46:44 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:46:44 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:46:44 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667301", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 653.493792] XFS (loop1): device supports 512 byte sectors (not 0) [ 653.551155] XFS (loop4): SB sanity check failed [ 653.555888] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 653.642582] kauditd_printk_skb: 148 callbacks suppressed [ 653.642597] audit: type=1400 audit(1542156404.527:9587): avc: denied { map } for pid=25640 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 653.698439] XFS (loop4): Unmount and run xfs_repair [ 653.735095] XFS (loop4): First 128 bytes of corrupted metadata buffer: 00:46:44 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfsX', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 653.783281] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 653.850467] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 653.891550] audit: type=1400 audit(1542156404.527:9588): avc: denied { map } for pid=25640 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 653.943634] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 653.989426] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 654.032910] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 654.077598] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 654.111793] audit: type=1400 audit(1542156404.597:9589): avc: denied { map } for pid=25642 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 654.146335] audit: type=1400 audit(1542156404.597:9590): avc: denied { map } for pid=25642 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 654.174150] audit: type=1400 audit(1542156404.647:9591): avc: denied { map } for pid=25658 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 654.182509] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 654.199674] audit: type=1400 audit(1542156404.677:9592): avc: denied { map } for pid=25658 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 654.229959] audit: type=1400 audit(1542156404.677:9593): avc: denied { map } for pid=25658 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 654.257452] audit: type=1400 audit(1542156404.687:9594): avc: denied { map } for pid=25642 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 654.285471] audit: type=1400 audit(1542156404.697:9595): avc: denied { map } for pid=25642 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 654.313370] audit: type=1400 audit(1542156404.707:9596): avc: denied { map } for pid=25658 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:46:45 executing program 0 (fault-call:4 fault-nth:0): pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 654.398245] XFS (loop2): device supports 512 byte sectors (not 0) [ 654.476751] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 654.542970] XFS (loop4): SB validate failed with error -117. 00:46:45 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:46:45 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 654.817276] XFS (loop5): Mounting V4 Filesystem [ 654.850140] XFS (loop5): totally zeroed log [ 654.874749] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:46:46 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 655.509291] FAULT_INJECTION: forcing a failure. [ 655.509291] name failslab, interval 1, probability 0, space 0, times 0 [ 655.567509] CPU: 1 PID: 25701 Comm: syz-executor0 Not tainted 4.20.0-rc2+ #112 [ 655.575016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 655.584376] Call Trace: [ 655.586993] dump_stack+0x244/0x39d [ 655.590644] ? dump_stack_print_info.cold.1+0x20/0x20 [ 655.595853] ? get_pid_task+0xd6/0x1a0 [ 655.599786] should_fail.cold.4+0xa/0x17 [ 655.603874] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 655.609037] ? __f_unlock_pos+0x19/0x20 [ 655.613037] ? lock_downgrade+0x900/0x900 [ 655.617203] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 655.622784] ? proc_fail_nth_write+0x9e/0x210 [ 655.627310] ? proc_cwd_link+0x1d0/0x1d0 [ 655.631399] ? find_held_lock+0x36/0x1c0 [ 655.635511] ? perf_trace_sched_process_exec+0x860/0x860 [ 655.640988] ? __lock_is_held+0xb5/0x140 [ 655.645075] __should_failslab+0x124/0x180 [ 655.649331] should_failslab+0x9/0x14 [ 655.653164] __kmalloc_track_caller+0x2d1/0x760 [ 655.657858] ? strncpy_from_user+0x5a0/0x5a0 [ 655.662297] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 655.667863] ? strndup_user+0x77/0xd0 [ 655.671685] memdup_user+0x2c/0xa0 [ 655.675244] strndup_user+0x77/0xd0 [ 655.678892] ksys_mount+0x3c/0x140 [ 655.682448] __x64_sys_mount+0xbe/0x150 [ 655.686459] do_syscall_64+0x1b9/0x820 [ 655.690364] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 655.695746] ? syscall_return_slowpath+0x5e0/0x5e0 [ 655.700705] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 655.705591] ? trace_hardirqs_on_caller+0x310/0x310 [ 655.710625] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 655.715656] ? prepare_exit_to_usermode+0x291/0x3b0 [ 655.720696] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 655.725572] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 655.730797] RIP: 0033:0x457569 [ 655.734009] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 655.752925] RSP: 002b:00007f1d0faf5c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 655.760653] RAX: ffffffffffffffda RBX: 00007f1d0faf5c90 RCX: 0000000000457569 [ 655.767944] RDX: 0000000020000600 RSI: 00000000200005c0 RDI: 0000000000000000 [ 655.775250] RBP: 000000000072bf00 R08: 0000000020000240 R09: 0000000000000000 [ 655.782531] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1d0faf66d4 [ 655.789807] R13: 00000000004c2b12 R14: 00000000004d4278 R15: 0000000000000005 00:46:46 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667301", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 656.154326] XFS (loop4): SB sanity check failed [ 656.162268] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 656.201515] XFS (loop4): Unmount and run xfs_repair [ 656.209223] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 656.271805] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 656.284395] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00:46:47 executing program 0 (fault-call:4 fault-nth:1): pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 656.338323] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 656.346589] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 656.355762] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 656.365162] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 656.379405] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 656.389097] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 656.401748] XFS (loop4): SB validate failed with error -117. 00:46:47 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 656.828952] XFS (loop2): device supports 512 byte sectors (not 0) 00:46:47 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:46:48 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\\', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 657.293987] XFS (loop5): Mounting V4 Filesystem [ 657.334884] XFS (loop5): totally zeroed log [ 657.378662] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 657.519959] FAULT_INJECTION: forcing a failure. [ 657.519959] name failslab, interval 1, probability 0, space 0, times 0 [ 657.603303] CPU: 1 PID: 25750 Comm: syz-executor0 Not tainted 4.20.0-rc2+ #112 [ 657.610711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 657.620073] Call Trace: [ 657.622680] dump_stack+0x244/0x39d [ 657.626333] ? dump_stack_print_info.cold.1+0x20/0x20 [ 657.631544] ? __kernel_text_address+0xd/0x40 [ 657.636059] ? unwind_get_return_address+0x61/0xa0 [ 657.641021] should_fail.cold.4+0xa/0x17 [ 657.645101] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 657.650225] ? kasan_kmalloc+0xc7/0xe0 [ 657.654130] ? __kmalloc_track_caller+0x157/0x760 [ 657.658991] ? memdup_user+0x2c/0xa0 [ 657.662727] ? zap_class+0x640/0x640 [ 657.666456] ? do_syscall_64+0x1b9/0x820 [ 657.670534] ? proc_fail_nth_write+0x9e/0x210 [ 657.675048] ? proc_cwd_link+0x1d0/0x1d0 [ 657.679137] ? find_held_lock+0x36/0x1c0 [ 657.683245] ? perf_trace_sched_process_exec+0x860/0x860 [ 657.688710] ? lock_release+0xa00/0xa00 [ 657.692713] ? perf_trace_sched_process_exec+0x860/0x860 [ 657.698226] ? usercopy_warn+0x110/0x110 [ 657.702310] __should_failslab+0x124/0x180 [ 657.706563] should_failslab+0x9/0x14 [ 657.710383] kmem_cache_alloc_trace+0x2d7/0x750 [ 657.715073] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 657.720624] ? _copy_from_user+0xdf/0x150 [ 657.724793] copy_mount_options+0x5f/0x430 [ 657.729048] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 657.734605] ksys_mount+0xd0/0x140 [ 657.738162] __x64_sys_mount+0xbe/0x150 [ 657.742156] do_syscall_64+0x1b9/0x820 [ 657.746064] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 657.751446] ? syscall_return_slowpath+0x5e0/0x5e0 [ 657.756396] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 657.761268] ? trace_hardirqs_on_caller+0x310/0x310 [ 657.766296] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 657.771324] ? prepare_exit_to_usermode+0x291/0x3b0 [ 657.776369] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 657.781234] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 657.786437] RIP: 0033:0x457569 00:46:48 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 657.789648] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 657.808558] RSP: 002b:00007f1d0faf5c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 657.816281] RAX: ffffffffffffffda RBX: 00007f1d0faf5c90 RCX: 0000000000457569 [ 657.823561] RDX: 0000000020000600 RSI: 00000000200005c0 RDI: 0000000000000000 [ 657.830838] RBP: 000000000072bf00 R08: 0000000020000240 R09: 0000000000000000 [ 657.838115] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1d0faf66d4 [ 657.845478] R13: 00000000004c2b12 R14: 00000000004d4278 R15: 0000000000000005 00:46:49 executing program 0 (fault-call:4 fault-nth:2): pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 658.303771] XFS (loop4): SB sanity check failed [ 658.318245] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 00:46:49 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 658.533391] XFS (loop4): Unmount and run xfs_repair [ 658.573927] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 658.580847] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 658.589160] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 658.599622] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 658.611504] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 658.619676] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 658.651296] kauditd_printk_skb: 188 callbacks suppressed [ 658.651312] audit: type=1400 audit(1542156409.537:9785): avc: denied { map } for pid=25771 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 658.722875] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 658.869453] audit: type=1400 audit(1542156409.567:9786): avc: denied { map } for pid=25771 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 658.873152] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 659.050105] audit: type=1400 audit(1542156409.637:9787): avc: denied { map } for pid=25771 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 659.098953] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 659.150326] XFS (loop4): SB validate failed with error -117. [ 659.156293] XFS (loop1): device supports 512 byte sectors (not 0) [ 659.218546] audit: type=1400 audit(1542156409.657:9788): avc: denied { map } for pid=25771 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:46:50 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:46:50 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 659.438026] audit: type=1400 audit(1542156409.747:9789): avc: denied { map } for pid=25771 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 659.621965] audit: type=1400 audit(1542156409.777:9790): avc: denied { map } for pid=25771 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:46:50 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs!', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 659.664862] XFS (loop5): Mounting V4 Filesystem [ 659.698197] FAULT_INJECTION: forcing a failure. [ 659.698197] name failslab, interval 1, probability 0, space 0, times 0 [ 659.732342] XFS (loop5): totally zeroed log [ 659.753231] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 659.812062] CPU: 1 PID: 25798 Comm: syz-executor0 Not tainted 4.20.0-rc2+ #112 [ 659.816241] audit: type=1400 audit(1542156409.967:9791): avc: denied { map } for pid=25785 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 659.819478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 659.819486] Call Trace: [ 659.819514] dump_stack+0x244/0x39d [ 659.819547] ? dump_stack_print_info.cold.1+0x20/0x20 [ 659.862364] should_fail.cold.4+0xa/0x17 [ 659.866453] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 659.871576] ? finish_task_switch+0x1f4/0x910 [ 659.876146] ? _raw_spin_unlock_irq+0x27/0x80 [ 659.880660] ? _raw_spin_unlock_irq+0x27/0x80 [ 659.885175] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 659.889776] ? trace_hardirqs_on+0xbd/0x310 [ 659.894133] ? kasan_check_read+0x11/0x20 [ 659.898314] ? finish_task_switch+0x1f4/0x910 [ 659.902826] ? trace_hardirqs_off_caller+0x310/0x310 [ 659.907953] ? find_held_lock+0x36/0x1c0 [ 659.912122] ? usb_start_wait_urb+0x2d8/0x370 [ 659.916656] ? __switch_to_asm+0x34/0x70 [ 659.920735] ? perf_trace_sched_process_exec+0x860/0x860 [ 659.926206] ? __switch_to_asm+0x34/0x70 [ 659.930308] ? __switch_to_asm+0x40/0x70 [ 659.934382] ? __switch_to_asm+0x34/0x70 [ 659.938456] ? __switch_to_asm+0x40/0x70 [ 659.942543] __should_failslab+0x124/0x180 [ 659.946794] should_failslab+0x9/0x14 [ 659.950613] kmem_cache_alloc+0x2be/0x730 [ 659.954776] ? __sched_text_start+0x8/0x8 [ 659.958967] getname_flags+0xd0/0x590 [ 659.962807] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 659.967584] user_path_at_empty+0x2d/0x50 [ 659.971752] do_mount+0x177/0x31f0 [ 659.973703] audit: type=1400 audit(1542156409.997:9792): avc: denied { map } for pid=25785 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 659.975305] ? retint_kernel+0x1b/0x2d [ 659.975325] ? trace_hardirqs_on+0x310/0x310 [ 659.975347] ? copy_mount_string+0x40/0x40 [ 659.975369] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 660.010151] ? retint_kernel+0x2d/0x2d [ 660.010187] ? __sanitizer_cov_trace_const_cmp8+0x1/0x20 [ 660.010205] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 660.010223] ? copy_mount_options+0x315/0x430 [ 660.010246] ksys_mount+0x12d/0x140 [ 660.034390] __x64_sys_mount+0xbe/0x150 [ 660.034412] do_syscall_64+0x1b9/0x820 [ 660.034430] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 660.034450] ? syscall_return_slowpath+0x5e0/0x5e0 [ 660.034471] ? trace_hardirqs_on_caller+0x310/0x310 [ 660.034499] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 660.066311] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 660.073001] ? __switch_to_asm+0x40/0x70 [ 660.077068] ? __switch_to_asm+0x34/0x70 [ 660.081157] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 660.086047] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 660.091252] RIP: 0033:0x457569 [ 660.094484] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 660.113425] RSP: 002b:00007f1d0faf5c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 660.113911] audit: type=1400 audit(1542156410.027:9793): avc: denied { map } for pid=25785 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 660.121166] RAX: ffffffffffffffda RBX: 00007f1d0faf5c90 RCX: 0000000000457569 [ 660.121177] RDX: 0000000020000600 RSI: 00000000200005c0 RDI: 0000000000000000 [ 660.121185] RBP: 000000000072bf00 R08: 0000000020000240 R09: 0000000000000000 [ 660.121194] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1d0faf66d4 [ 660.121204] R13: 00000000004c2b12 R14: 00000000004d4278 R15: 0000000000000005 00:46:51 executing program 0 (fault-call:4 fault-nth:3): pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 660.400514] audit: type=1400 audit(1542156410.037:9794): avc: denied { map } for pid=25788 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:46:51 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 660.642627] XFS (loop3): Mounting V4 Filesystem [ 660.647936] XFS (loop3): AIL initialisation failed: error -12 [ 660.736401] XFS (loop3): log mount failed [ 660.808103] XFS (loop1): device supports 512 byte sectors (not 0) [ 660.821752] XFS (loop4): SB sanity check failed [ 660.826923] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 00:46:51 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 660.940387] XFS (loop4): Unmount and run xfs_repair [ 660.970394] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 661.020435] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 661.071299] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 661.094211] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 00:46:52 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 661.247757] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 661.311973] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 661.341335] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 661.354212] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 661.447850] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 661.519379] XFS (loop4): SB validate failed with error -117. [ 661.749809] FAULT_INJECTION: forcing a failure. [ 661.749809] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 661.761697] CPU: 0 PID: 25856 Comm: syz-executor0 Not tainted 4.20.0-rc2+ #112 [ 661.769090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 661.778473] Call Trace: [ 661.781106] dump_stack+0x244/0x39d [ 661.784772] ? dump_stack_print_info.cold.1+0x20/0x20 [ 661.790005] should_fail.cold.4+0xa/0x17 [ 661.794103] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 661.799269] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 661.804848] ? check_preemption_disabled+0x48/0x280 [ 661.810106] ? mark_held_locks+0x130/0x130 [ 661.814441] ? pick_next_task_fair+0xa05/0x1b30 [ 661.819165] ? rcu_read_lock_sched_held+0x14f/0x180 [ 661.824255] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 661.830255] ? zap_class+0x640/0x640 [ 661.834016] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 661.839657] ? __perf_event_task_sched_in+0x2a9/0xb60 [ 661.844897] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 661.850558] ? should_fail+0x22d/0xd01 [ 661.854494] ? find_held_lock+0x36/0x1c0 [ 661.858640] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 661.863825] __alloc_pages_nodemask+0x34b/0xde0 [ 661.868540] ? _raw_spin_unlock_irq+0x27/0x80 [ 661.873068] ? _raw_spin_unlock_irq+0x27/0x80 [ 661.877604] ? __alloc_pages_slowpath+0x2e10/0x2e10 [ 661.882650] ? trace_hardirqs_on+0xbd/0x310 [ 661.887003] ? finish_task_switch+0x1f4/0x910 [ 661.891539] ? find_held_lock+0x36/0x1c0 [ 661.895777] ? trace_hardirqs_off+0xb8/0x310 [ 661.900255] cache_grow_begin+0xa5/0x8c0 [ 661.904353] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 661.909921] ? check_preemption_disabled+0x48/0x280 [ 661.914974] kmem_cache_alloc+0x66b/0x730 [ 661.919164] ? __sched_text_start+0x8/0x8 [ 661.923348] getname_flags+0xd0/0x590 [ 661.927190] user_path_at_empty+0x2d/0x50 [ 661.931409] do_mount+0x177/0x31f0 [ 661.934980] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 661.940470] ? retint_kernel+0x1b/0x2d [ 661.944398] ? trace_hardirqs_on+0x310/0x310 [ 661.948839] ? copy_mount_string+0x40/0x40 [ 661.953197] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 661.958109] ? retint_kernel+0x2d/0x2d [ 661.962131] ? copy_mount_options+0x217/0x430 [ 661.966657] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 661.972261] ? copy_mount_options+0x315/0x430 [ 661.976801] ksys_mount+0x12d/0x140 [ 661.980465] __x64_sys_mount+0xbe/0x150 [ 661.984493] do_syscall_64+0x1b9/0x820 [ 661.988411] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 661.993810] ? syscall_return_slowpath+0x5e0/0x5e0 [ 661.998774] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 662.003761] ? trace_hardirqs_on_caller+0x310/0x310 [ 662.008809] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 662.013856] ? prepare_exit_to_usermode+0x291/0x3b0 [ 662.018911] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 662.023801] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 662.029019] RIP: 0033:0x457569 [ 662.032271] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:46:53 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667302", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 662.051203] RSP: 002b:00007f1d0faf5c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 662.058973] RAX: ffffffffffffffda RBX: 00007f1d0faf5c90 RCX: 0000000000457569 [ 662.066285] RDX: 0000000020000600 RSI: 00000000200005c0 RDI: 0000000000000000 [ 662.073577] RBP: 000000000072bf00 R08: 0000000020000240 R09: 0000000000000000 [ 662.080871] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1d0faf66d4 [ 662.088443] R13: 00000000004c2b12 R14: 00000000004d4278 R15: 0000000000000005 [ 662.272848] 9pnet: p9_errstr2errno: server reported unknown error [ 662.425021] XFS (loop5): Mounting V4 Filesystem 00:46:53 executing program 0 (fault-call:4 fault-nth:4): pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 662.476093] XFS (loop5): AIL initialisation failed: error -12 00:46:53 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 662.550696] XFS (loop5): log mount failed 00:46:53 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 662.874915] XFS (loop3): Mounting V4 Filesystem [ 662.916806] XFS (loop3): totally zeroed log [ 662.931078] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 663.031870] XFS (loop1): device supports 512 byte sectors (not 0) 00:46:54 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:46:54 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 663.660724] kauditd_printk_skb: 149 callbacks suppressed [ 663.660740] audit: type=1400 audit(1542156414.547:9944): avc: denied { map } for pid=25907 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 663.790024] FAULT_INJECTION: forcing a failure. [ 663.790024] name failslab, interval 1, probability 0, space 0, times 0 [ 663.852475] CPU: 1 PID: 25910 Comm: syz-executor0 Not tainted 4.20.0-rc2+ #112 [ 663.859900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 663.869298] Call Trace: [ 663.871919] dump_stack+0x244/0x39d [ 663.875836] ? dump_stack_print_info.cold.1+0x20/0x20 [ 663.881204] ? mark_held_locks+0x130/0x130 [ 663.885525] should_fail.cold.4+0xa/0x17 [ 663.889634] ? flex_array_get_ptr+0x49/0x60 [ 663.893999] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 663.899151] ? context_struct_compute_av+0x1600/0x1600 [ 663.904461] ? check_preemption_disabled+0x48/0x280 [ 663.909508] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 663.914556] ? ebitmap_contains+0x233/0x520 [ 663.918911] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 663.924485] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 663.929707] ? zap_class+0x640/0x640 [ 663.933453] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 663.939028] ? constraint_expr_eval.isra.6+0x2d7/0x1560 [ 663.944426] ? flex_array_get_ptr+0x49/0x60 [ 663.948785] ? zap_class+0x640/0x640 [ 663.952544] ? find_held_lock+0x36/0x1c0 [ 663.956650] ? find_held_lock+0x36/0x1c0 [ 663.960753] __should_failslab+0x124/0x180 [ 663.965028] should_failslab+0x9/0x14 [ 663.968861] kmem_cache_alloc+0x47/0x730 [ 663.972950] ? trace_hardirqs_on+0xbd/0x310 [ 663.977316] ? kasan_check_read+0x11/0x20 [ 663.981500] ? avc_compute_av+0x2c5/0x800 [ 663.985683] ? trace_hardirqs_off_caller+0x310/0x310 [ 663.990821] avc_alloc_node+0x2a/0x600 [ 663.994923] avc_compute_av+0x2d1/0x800 [ 663.998972] ? avc_has_perm_noaudit+0xd5/0x630 [ 664.003589] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 664.009163] ? avc_alloc_node+0x600/0x600 [ 664.013357] ? kasan_check_read+0x11/0x20 [ 664.017532] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 664.022836] ? rcu_softirq_qs+0x20/0x20 [ 664.026840] ? print_usage_bug+0xc0/0xc0 [ 664.030946] avc_has_perm_noaudit+0x3b3/0x630 [ 664.035483] ? __lock_acquire+0x62f/0x4c20 [ 664.039751] ? avc_has_extended_perms+0x15a0/0x15a0 [ 664.044812] ? print_usage_bug+0xc0/0xc0 [ 664.048912] ? find_held_lock+0x36/0x1c0 [ 664.053028] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 664.058600] selinux_inode_permission+0x3da/0x750 [ 664.063482] ? selinux_capable+0x40/0x40 [ 664.067577] ? lock_downgrade+0x900/0x900 [ 664.071757] ? check_preemption_disabled+0x48/0x280 [ 664.076814] security_inode_permission+0x9e/0x100 [ 664.081691] inode_permission+0x11e/0x560 [ 664.085964] link_path_walk.part.40+0x1fc/0x1530 [ 664.090757] ? lookup_open+0x1b90/0x1b90 [ 664.094864] ? walk_component+0x2590/0x2590 [ 664.099282] ? __save_stack_trace+0x8d/0xf0 [ 664.103656] ? save_stack+0xa9/0xd0 [ 664.107319] ? save_stack+0x43/0xd0 [ 664.110974] ? kasan_kmalloc+0xc7/0xe0 [ 664.114902] ? kasan_slab_alloc+0x12/0x20 [ 664.119075] ? kmem_cache_alloc+0x12e/0x730 [ 664.123425] ? getname_flags+0xd0/0x590 [ 664.127431] ? user_path_at_empty+0x2d/0x50 [ 664.131790] path_lookupat.isra.43+0xf7/0xc00 [ 664.136316] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 664.141543] ? path_parentat.isra.41+0x160/0x160 [ 664.146551] ? usercopy_warn+0x110/0x110 [ 664.150654] ? check_preemption_disabled+0x48/0x280 [ 664.155829] filename_lookup+0x26a/0x520 [ 664.159945] ? filename_parentat.isra.56+0x570/0x570 [ 664.165088] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 664.170676] ? digsig_verify+0x1530/0x1530 [ 664.174948] ? kmem_cache_alloc+0x33a/0x730 [ 664.179427] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 664.185001] ? getname_flags+0x26e/0x590 [ 664.189102] user_path_at_empty+0x40/0x50 [ 664.193380] do_mount+0x177/0x31f0 [ 664.196951] ? check_preemption_disabled+0x48/0x280 [ 664.202021] ? copy_mount_string+0x40/0x40 [ 664.206306] ? rcu_pm_notify+0xc0/0xc0 [ 664.210271] ? copy_mount_options+0x5f/0x430 [ 664.214724] ? rcu_read_lock_sched_held+0x14f/0x180 [ 664.219955] ? kmem_cache_alloc_trace+0x353/0x750 [ 664.224848] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 664.230413] ? copy_mount_options+0x315/0x430 [ 664.234988] ksys_mount+0x12d/0x140 [ 664.238851] __x64_sys_mount+0xbe/0x150 [ 664.242870] do_syscall_64+0x1b9/0x820 [ 664.246787] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 664.252183] ? syscall_return_slowpath+0x5e0/0x5e0 [ 664.257177] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 664.262051] ? trace_hardirqs_on_caller+0x310/0x310 [ 664.267100] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 664.272150] ? prepare_exit_to_usermode+0x291/0x3b0 [ 664.277201] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 664.282114] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 664.287331] RIP: 0033:0x457569 [ 664.290552] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 664.309480] RSP: 002b:00007f1d0faf5c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 664.317256] RAX: ffffffffffffffda RBX: 00007f1d0faf5c90 RCX: 0000000000457569 [ 664.324555] RDX: 0000000020000600 RSI: 00000000200005c0 RDI: 0000000000000000 [ 664.331855] RBP: 000000000072bf00 R08: 0000000020000240 R09: 0000000000000000 [ 664.339151] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1d0faf66d4 [ 664.346444] R13: 00000000004c2b12 R14: 00000000004d4278 R15: 0000000000000005 [ 664.416144] audit: type=1400 audit(1542156414.637:9945): avc: denied { map } for pid=25904 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 664.480591] XFS (loop2): device supports 512 byte sectors (not 0) [ 664.508054] 9pnet: p9_errstr2errno: server reported unknown error 00:46:55 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 664.627285] audit: type=1400 audit(1542156414.687:9946): avc: denied { map } for pid=25901 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:46:55 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 664.797912] audit: type=1400 audit(1542156414.687:9947): avc: denied { map } for pid=25901 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:46:55 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 664.901862] audit: type=1400 audit(1542156414.707:9948): avc: denied { map } for pid=25909 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 664.924315] audit: type=1400 audit(1542156414.727:9949): avc: denied { map } for pid=25909 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 664.951471] audit: type=1400 audit(1542156414.737:9950): avc: denied { map } for pid=25907 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 665.055041] XFS (loop3): Mounting V4 Filesystem [ 665.102835] XFS (loop3): totally zeroed log [ 665.109813] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:46:56 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 665.153040] audit: type=1400 audit(1542156414.737:9951): avc: denied { map } for pid=25904 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:46:56 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 665.402328] audit: type=1400 audit(1542156414.737:9952): avc: denied { map } for pid=25904 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 665.462383] audit: type=1400 audit(1542156414.737:9953): avc: denied { map } for pid=25907 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 665.689152] XFS (loop1): device supports 512 byte sectors (not 0) [ 665.945382] XFS (loop4): SB sanity check failed 00:46:56 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 665.969498] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 666.020359] XFS (loop4): Unmount and run xfs_repair [ 666.025584] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 666.065804] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 666.104549] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 666.152086] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 666.198190] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 666.242569] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 666.284266] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 666.324795] XFS (loop5): Mounting V4 Filesystem [ 666.344625] XFS (loop5): totally zeroed log [ 666.361196] XFS (loop2): device supports 512 byte sectors (not 0) [ 666.374090] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 666.405270] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 666.465026] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 666.548083] XFS (loop4): SB validate failed with error -117. [ 666.620353] 9pnet: p9_errstr2errno: server reported unknown error 00:46:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673d0", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:46:57 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:46:57 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x12, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 666.938211] XFS (loop3): Mounting V4 Filesystem [ 666.995374] XFS (loop3): totally zeroed log [ 667.032888] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:46:58 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:46:58 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 667.533275] XFS (loop1): device supports 512 byte sectors (not 0) 00:46:58 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="78667380", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:46:58 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x6b6b6b00000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 668.065540] XFS (loop4): SB sanity check failed [ 668.072760] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 668.100385] XFS (loop4): Unmount and run xfs_repair [ 668.105447] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 668.216396] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 668.260376] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 668.349378] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 668.442668] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 668.459063] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 668.478973] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 668.614874] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 668.685533] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 668.693856] XFS (loop4): SB validate failed with error -117. 00:46:59 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667310", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 668.837757] XFS (loop5): Mounting V4 Filesystem [ 668.873261] XFS (loop5): totally zeroed log [ 668.904046] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 668.974860] XFS (loop3): Mounting V4 Filesystem [ 669.033198] XFS (loop3): totally zeroed log [ 669.046106] kauditd_printk_skb: 147 callbacks suppressed [ 669.046120] audit: type=1400 audit(1542156419.927:10101): avc: denied { map } for pid=26068 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:00 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 669.104573] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 669.307936] audit: type=1400 audit(1542156419.937:10102): avc: denied { map } for pid=26068 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:00 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="7866737f", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 669.490110] audit: type=1400 audit(1542156419.957:10103): avc: denied { map } for pid=26068 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:00 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0xc00000000000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 669.643103] audit: type=1400 audit(1542156419.977:10104): avc: denied { map } for pid=26068 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 669.670875] audit: type=1400 audit(1542156419.997:10105): avc: denied { map } for pid=26070 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:00 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 669.699715] audit: type=1400 audit(1542156420.007:10106): avc: denied { map } for pid=26070 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 669.728082] audit: type=1400 audit(1542156420.037:10107): avc: denied { map } for pid=26068 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 669.754200] audit: type=1400 audit(1542156420.047:10108): avc: denied { map } for pid=26070 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 669.851828] audit: type=1400 audit(1542156420.047:10109): avc: denied { map } for pid=26070 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 669.879131] audit: type=1400 audit(1542156420.077:10110): avc: denied { map } for pid=26072 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:01 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="7866731a", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 670.757879] XFS (loop4): SB sanity check failed [ 670.763995] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 670.865968] XFS (loop4): Unmount and run xfs_repair [ 670.910090] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 670.950984] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 00:47:01 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667316", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 670.993696] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 671.058767] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 671.090300] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ 00:47:02 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x1600, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 671.160497] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 671.190397] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 671.254911] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 671.285117] XFS (loop3): Mounting V4 Filesystem [ 671.317873] XFS (loop3): totally zeroed log [ 671.351163] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 671.364574] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 671.418138] XFS (loop4): SB validate failed with error -117. 00:47:02 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:47:02 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsk', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:47:02 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:47:03 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:47:03 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x400000000000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 672.866245] XFS (loop5): Mounting V4 Filesystem [ 672.902663] XFS (loop5): totally zeroed log 00:47:03 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 672.933845] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 673.105875] XFS (loop3): Mounting V4 Filesystem [ 673.147767] XFS (loop3): totally zeroed log [ 673.193690] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:47:04 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667398", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 673.690799] XFS (loop1): device supports 512 byte sectors (not 0) 00:47:04 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:47:04 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:47:04 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x12000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 674.067502] kauditd_printk_skb: 242 callbacks suppressed [ 674.067518] audit: type=1400 audit(1542156424.947:10353): avc: denied { map } for pid=26196 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 674.172089] audit: type=1400 audit(1542156424.947:10354): avc: denied { map } for pid=26196 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 674.199895] audit: type=1400 audit(1542156424.957:10355): avc: denied { map } for pid=26188 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 674.238044] audit: type=1400 audit(1542156424.957:10356): avc: denied { map } for pid=26188 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 674.342247] audit: type=1400 audit(1542156425.117:10357): avc: denied { map } for pid=26196 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 674.369702] audit: type=1400 audit(1542156425.177:10358): avc: denied { map } for pid=26196 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:05 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 674.449442] audit: type=1400 audit(1542156425.327:10359): avc: denied { map } for pid=26196 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 674.587150] audit: type=1400 audit(1542156425.357:10360): avc: denied { map } for pid=26196 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 674.760273] audit: type=1400 audit(1542156425.387:10361): avc: denied { map } for pid=26206 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 674.902196] audit: type=1400 audit(1542156425.387:10362): avc: denied { map } for pid=26206 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 675.007604] XFS (loop2): device supports 512 byte sectors (not 0) 00:47:06 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:47:06 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667303", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:47:06 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x2088, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 675.564757] XFS (loop3): Mounting V4 Filesystem [ 675.605472] XFS (loop3): totally zeroed log [ 675.638253] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 675.673706] XFS (loop4): SB sanity check failed [ 675.678433] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 675.678443] XFS (loop4): Unmount and run xfs_repair [ 675.678455] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 675.678470] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 675.678482] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 675.678502] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 675.678517] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 675.741446] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 675.753000] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 675.765390] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 675.778087] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 675.789758] XFS (loop4): SB validate failed with error -117. [ 675.796008] XFS (loop1): device supports 512 byte sectors (not 0) 00:47:06 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667306", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:47:07 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:47:07 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 676.546920] XFS (loop5): Mounting V4 Filesystem [ 676.585286] XFS (loop5): totally zeroed log [ 676.618725] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:47:07 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x4000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:47:07 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:47:08 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 677.576464] XFS (loop4): SB sanity check failed [ 677.581746] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 677.642093] XFS (loop4): Unmount and run xfs_repair [ 677.676610] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 677.717560] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 677.761264] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 677.803032] XFS (loop1): device supports 512 byte sectors (not 0) [ 677.841372] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 677.931330] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ 00:47:08 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0xc0ed0000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 677.976443] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 00:47:08 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs4', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 678.028385] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 678.040058] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 678.052438] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 678.120378] XFS (loop4): SB validate failed with error -117. 00:47:09 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="786673ff", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 678.403469] XFS (loop5): Mounting V4 Filesystem [ 678.422108] XFS (loop5): totally zeroed log [ 678.490523] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:47:09 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs,', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:47:09 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 679.078910] kauditd_printk_skb: 157 callbacks suppressed [ 679.078926] audit: type=1400 audit(1542156429.957:10520): avc: denied { map } for pid=26342 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 679.171583] audit: type=1400 audit(1542156430.007:10521): avc: denied { map } for pid=26332 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:10 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0xffff000000000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 679.388595] XFS (loop2): device supports 512 byte sectors (not 0) [ 679.390144] audit: type=1400 audit(1542156430.037:10522): avc: denied { map } for pid=26342 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 679.523528] audit: type=1400 audit(1542156430.047:10523): avc: denied { map } for pid=26332 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:10 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 679.669599] audit: type=1400 audit(1542156430.117:10524): avc: denied { map } for pid=26355 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 679.880297] audit: type=1400 audit(1542156430.127:10525): avc: denied { map } for pid=26355 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:10 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 680.023960] audit: type=1400 audit(1542156430.127:10526): avc: denied { map } for pid=26355 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:10 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="786673ee", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 680.190291] audit: type=1400 audit(1542156430.127:10527): avc: denied { map } for pid=26355 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 680.326258] audit: type=1400 audit(1542156430.137:10528): avc: denied { map } for pid=26355 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 680.498956] audit: type=1400 audit(1542156430.197:10529): avc: denied { map } for pid=26356 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:11 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0xff01000000000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 680.705649] XFS (loop5): Mounting V4 Filesystem [ 680.766467] XFS (loop5): totally zeroed log [ 680.783937] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:47:11 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:47:12 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsk', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 681.074864] XFS (loop2): device supports 512 byte sectors (not 0) [ 681.149831] XFS (loop3): Mounting V4 Filesystem [ 681.196171] XFS (loop3): totally zeroed log [ 681.234275] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:47:12 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:47:12 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:47:12 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x900000000000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:47:12 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 682.199709] XFS (loop4): SB sanity check failed [ 682.204517] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 682.250399] XFS (loop4): Unmount and run xfs_repair [ 682.255469] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 682.312038] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 682.382904] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 682.433253] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 682.490825] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 682.553470] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 682.611820] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 682.659772] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 682.686956] XFS (loop2): device supports 512 byte sectors (not 0) [ 682.723871] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 682.813175] XFS (loop4): SB validate failed with error -117. 00:47:13 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 683.036676] XFS (loop3): Mounting V4 Filesystem [ 683.076468] XFS (loop3): totally zeroed log 00:47:14 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 683.115142] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:47:14 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:47:14 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x300000000000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:47:14 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 683.558309] XFS (loop1): device supports 512 byte sectors (not 0) 00:47:14 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 684.248657] kauditd_printk_skb: 199 callbacks suppressed [ 684.248672] audit: type=1400 audit(1542156435.127:10729): avc: denied { map } for pid=26491 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 684.300396] XFS (loop4): SB sanity check failed [ 684.323428] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 684.402772] audit: type=1400 audit(1542156435.167:10730): avc: denied { map } for pid=26491 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 684.442007] XFS (loop2): device supports 512 byte sectors (not 0) [ 684.467395] XFS (loop4): Unmount and run xfs_repair [ 684.520626] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 684.573053] audit: type=1400 audit(1542156435.197:10731): avc: denied { map } for pid=26491 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:15 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x7000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 684.617726] XFS (loop5): Mounting V4 Filesystem [ 684.626044] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 684.654495] XFS (loop5): totally zeroed log 00:47:15 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667313", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 684.690325] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 684.711306] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 684.728727] XFS (loop3): Mounting V4 Filesystem [ 684.760831] XFS (loop3): totally zeroed log [ 684.779930] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 684.792022] audit: type=1400 audit(1542156435.197:10732): avc: denied { map } for pid=26491 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 684.873982] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 684.895020] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 684.950798] audit: type=1400 audit(1542156435.267:10733): avc: denied { map } for pid=26503 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:15 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 685.014912] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 685.040343] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 685.160654] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 685.198290] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 685.248222] XFS (loop1): device supports 512 byte sectors (not 0) [ 685.295623] audit: type=1400 audit(1542156435.267:10734): avc: denied { map } for pid=26491 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 685.340399] XFS (loop4): SB validate failed with error -117. 00:47:16 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:47:16 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 685.646564] audit: type=1400 audit(1542156435.277:10735): avc: denied { map } for pid=26503 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:16 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 685.756644] audit: type=1400 audit(1542156435.307:10736): avc: denied { map } for pid=26491 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 685.941725] audit: type=1400 audit(1542156435.327:10737): avc: denied { map } for pid=26503 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 686.103292] audit: type=1400 audit(1542156435.337:10738): avc: denied { map } for pid=26491 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:17 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0xa000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 686.479862] XFS (loop5): Mounting V4 Filesystem [ 686.513599] XFS (loop5): totally zeroed log [ 686.548135] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:47:17 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 686.997067] XFS (loop3): Mounting V4 Filesystem [ 687.013112] XFS (loop3): totally zeroed log [ 687.052062] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 687.057814] XFS (loop4): SB sanity check failed [ 687.065610] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 687.115617] XFS (loop4): Unmount and run xfs_repair [ 687.156396] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 687.208752] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 00:47:18 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\n', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 687.285986] XFS (loop1): device supports 512 byte sectors (not 0) [ 687.291859] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00:47:18 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 687.346655] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 00:47:18 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x3f00, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 687.419395] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 687.553526] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 687.650488] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 00:47:18 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="7866731b", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 687.724689] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 687.797243] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 687.950425] XFS (loop4): SB validate failed with error -117. 00:47:18 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 688.443870] XFS (loop2): device supports 512 byte sectors (not 0) 00:47:19 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 688.847009] XFS (loop3): Mounting V4 Filesystem 00:47:19 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0xfeffffff00000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 688.972895] XFS (loop3): totally zeroed log [ 688.990150] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 689.317317] kauditd_printk_skb: 177 callbacks suppressed [ 689.317332] audit: type=1400 audit(1542156440.197:10916): avc: denied { map } for pid=26662 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 689.628219] audit: type=1400 audit(1542156440.217:10917): avc: denied { map } for pid=26658 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:20 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="7866730e", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 689.741694] XFS (loop4): Invalid superblock magic number [ 689.810292] audit: type=1400 audit(1542156440.227:10918): avc: denied { map } for pid=26662 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:20 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:47:20 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 689.952725] audit: type=1400 audit(1542156440.257:10919): avc: denied { map } for pid=26662 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:21 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 690.151644] audit: type=1400 audit(1542156440.287:10920): avc: denied { map } for pid=26662 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:21 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0xe101000000000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 690.375865] audit: type=1400 audit(1542156440.367:10921): avc: denied { map } for pid=26662 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 690.535406] audit: type=1400 audit(1542156440.377:10922): avc: denied { map } for pid=26658 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 690.591768] XFS (loop2): device supports 512 byte sectors (not 0) [ 690.674764] audit: type=1400 audit(1542156440.377:10923): avc: denied { map } for pid=26658 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:21 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="7866730f", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 690.858041] audit: type=1400 audit(1542156440.407:10924): avc: denied { map } for pid=26662 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 691.035693] XFS (loop3): Mounting V4 Filesystem [ 691.092838] audit: type=1400 audit(1542156440.447:10925): avc: denied { map } for pid=26662 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 691.125849] XFS (loop3): totally zeroed log [ 691.146619] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 691.154129] XFS (loop5): Mounting V4 Filesystem [ 691.176774] XFS (loop5): totally zeroed log [ 691.215054] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:47:22 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\t', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:47:22 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 691.593568] XFS (loop4): SB sanity check failed [ 691.598342] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 691.621349] XFS (loop4): Unmount and run xfs_repair [ 691.629615] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 691.639971] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 691.651370] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 691.662765] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 691.681018] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 691.692380] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 691.703834] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 691.715409] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 691.728138] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00:47:22 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 691.739858] XFS (loop4): SB validate failed with error -117. 00:47:22 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0xffffff7f00000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:47:23 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:47:23 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667380", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:47:23 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x3000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 693.037969] XFS (loop1): device supports 512 byte sectors (not 0) [ 693.206475] XFS (loop5): Mounting V4 Filesystem 00:47:24 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfsk', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 693.248395] XFS (loop5): totally zeroed log [ 693.290649] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 693.384583] XFS (loop4): SB sanity check failed [ 693.389553] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 693.460448] XFS (loop4): Unmount and run xfs_repair [ 693.465762] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 693.514682] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 693.560359] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00:47:24 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 693.603627] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 693.698050] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 693.761234] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 693.796428] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 00:47:24 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 693.866233] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 693.884112] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 693.935178] XFS (loop4): SB validate failed with error -117. 00:47:25 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x6b6b6b00, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:47:25 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 694.369971] kauditd_printk_skb: 215 callbacks suppressed [ 694.369987] audit: type=1400 audit(1542156445.247:11132): avc: denied { map } for pid=26802 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:25 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673e8", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 694.529642] audit: type=1400 audit(1542156445.317:11133): avc: denied { map } for pid=26802 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 694.703771] audit: type=1400 audit(1542156445.367:11134): avc: denied { map } for pid=26802 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 694.913665] audit: type=1400 audit(1542156445.377:11135): avc: denied { map } for pid=26802 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 695.084465] audit: type=1400 audit(1542156445.547:11136): avc: denied { map } for pid=26814 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 695.194735] XFS (loop5): Mounting V4 Filesystem [ 695.212764] XFS (loop5): totally zeroed log [ 695.226556] XFS (loop3): Mounting V4 Filesystem [ 695.254258] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 695.265535] audit: type=1400 audit(1542156445.547:11137): avc: denied { map } for pid=26814 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 695.288982] XFS (loop3): totally zeroed log [ 695.302829] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:47:26 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 695.462617] audit: type=1400 audit(1542156445.617:11138): avc: denied { map } for pid=26814 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 695.490116] audit: type=1400 audit(1542156445.617:11139): avc: denied { map } for pid=26814 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 695.522997] audit: type=1400 audit(1542156445.647:11140): avc: denied { map } for pid=26816 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 695.548516] audit: type=1400 audit(1542156445.657:11141): avc: denied { map } for pid=26816 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:26 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:47:26 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0xfeffff00000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:47:26 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 695.790713] XFS (loop4): SB sanity check failed [ 695.800494] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 695.860382] XFS (loop4): Unmount and run xfs_repair [ 695.865576] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 695.900382] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 695.980390] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 696.053868] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 696.141363] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 696.224032] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 696.302812] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 696.340437] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 696.410399] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 696.471730] XFS (loop4): SB validate failed with error -117. 00:47:27 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 696.629761] XFS (loop1): device supports 512 byte sectors (not 0) 00:47:27 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x6000000000000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:47:27 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsp', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:47:27 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="78667302", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 697.187895] XFS (loop5): Mounting V4 Filesystem [ 697.192850] XFS (loop3): Mounting V4 Filesystem [ 697.226355] XFS (loop3): totally zeroed log [ 697.234310] XFS (loop5): totally zeroed log [ 697.260719] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 697.286781] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:47:28 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs4', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:47:28 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsL', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:47:28 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0xb000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 698.146841] XFS (loop4): SB sanity check failed [ 698.151951] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 698.170384] XFS (loop4): Unmount and run xfs_repair [ 698.191980] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 698.265743] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 698.337726] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 698.403023] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 698.466832] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 698.556636] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 698.698239] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 00:47:29 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="78667315", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 698.766519] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ 00:47:29 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 698.832695] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 698.933584] XFS (loop4): SB validate failed with error -117. 00:47:29 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs`', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:47:30 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0xffffff8c, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 699.412371] kauditd_printk_skb: 183 callbacks suppressed [ 699.412388] audit: type=1400 audit(1542156450.297:11325): avc: denied { map } for pid=26952 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 699.600355] audit: type=1400 audit(1542156450.297:11326): avc: denied { map } for pid=26951 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 699.787425] audit: type=1400 audit(1542156450.297:11327): avc: denied { map } for pid=26951 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:30 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs@', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 699.969779] audit: type=1400 audit(1542156450.397:11328): avc: denied { map } for pid=26952 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:30 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 700.154473] audit: type=1400 audit(1542156450.407:11329): avc: denied { map } for pid=26952 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 700.300556] audit: type=1400 audit(1542156450.517:11330): avc: denied { map } for pid=26952 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 700.424968] audit: type=1400 audit(1542156450.537:11331): avc: denied { map } for pid=26952 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 700.455863] XFS (loop2): device supports 512 byte sectors (not 0) [ 700.523883] audit: type=1400 audit(1542156450.637:11332): avc: denied { map } for pid=26957 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:31 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x4, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 700.712187] audit: type=1400 audit(1542156450.637:11333): avc: denied { map } for pid=26957 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 700.809679] audit: audit_backlog=65 > audit_backlog_limit=64 00:47:31 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:47:31 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:47:32 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs4', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 701.869361] XFS (loop3): Mounting V4 Filesystem [ 701.902130] XFS (loop3): totally zeroed log [ 701.929562] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 702.178462] XFS (loop1): device supports 512 byte sectors (not 0) 00:47:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsy', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:47:33 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x4703000000000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:47:33 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 702.463490] XFS (loop2): device supports 512 byte sectors (not 0) 00:47:33 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:47:33 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\'', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:47:34 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:47:34 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x1000000000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 703.760441] XFS (loop1): device supports 512 byte sectors (not 0) [ 703.967073] XFS (loop5): Mounting V4 Filesystem [ 704.006864] XFS (loop5): totally zeroed log [ 704.035139] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:47:35 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="7866731e", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:47:35 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsy', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:47:35 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 704.462640] kauditd_printk_skb: 231 callbacks suppressed [ 704.462657] audit: type=1400 audit(1542156455.347:11554): avc: denied { map } for pid=27076 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 704.519476] XFS (loop4): SB sanity check failed [ 704.524509] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 704.580397] XFS (loop4): Unmount and run xfs_repair [ 704.585543] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 704.680345] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 00:47:35 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667319", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 704.729451] audit: type=1400 audit(1542156455.347:11555): avc: denied { map } for pid=27085 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 704.749227] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 704.824669] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 704.920360] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 704.937302] audit: type=1400 audit(1542156455.387:11556): avc: denied { map } for pid=27076 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:35 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x4000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 705.060323] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 705.068542] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 705.140353] audit: type=1400 audit(1542156455.417:11557): avc: denied { map } for pid=27085 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 705.254003] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 705.322340] audit: type=1400 audit(1542156455.427:11558): avc: denied { map } for pid=27085 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 705.369463] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 705.450434] XFS (loop4): SB validate failed with error -117. [ 705.516424] audit: type=1400 audit(1542156455.457:11559): avc: denied { map } for pid=27085 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 705.640685] audit: type=1400 audit(1542156455.487:11560): avc: denied { map } for pid=27076 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:36 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 705.780986] audit: type=1400 audit(1542156455.497:11561): avc: denied { map } for pid=27076 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 705.831064] audit: type=1400 audit(1542156455.507:11562): avc: denied { map } for pid=27096 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 705.900200] audit: type=1400 audit(1542156455.507:11563): avc: denied { map } for pid=27096 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 705.969228] XFS (loop5): Mounting V4 Filesystem [ 706.015642] XFS (loop5): totally zeroed log [ 706.023901] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:47:37 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:47:37 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:47:37 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0xa00, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:47:37 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:47:37 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 707.446310] XFS (loop4): SB sanity check failed [ 707.480412] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 707.604690] XFS (loop4): Unmount and run xfs_repair [ 707.609757] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 707.619944] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 707.650277] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 707.658452] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 707.753391] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 707.826431] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 707.933897] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 00:47:38 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0xb, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 708.042689] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 708.104049] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 708.153929] XFS (loop1): device supports 512 byte sectors (not 0) [ 708.162044] XFS (loop4): SB validate failed with error -117. 00:47:39 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 708.325451] XFS (loop3): Mounting V4 Filesystem [ 708.345588] XFS (loop2): device supports 512 byte sectors (not 0) [ 708.369637] XFS (loop3): totally zeroed log [ 708.380042] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 708.397369] XFS (loop5): Mounting V4 Filesystem [ 708.431674] XFS (loop5): totally zeroed log 00:47:39 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 708.475427] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:47:39 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:47:39 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:47:39 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:47:40 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x8000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 709.514137] XFS (loop4): SB sanity check failed [ 709.519123] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 709.607144] XFS (loop4): Unmount and run xfs_repair [ 709.660045] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 709.696008] XFS (loop1): device supports 512 byte sectors (not 0) [ 709.708266] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 709.767781] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 709.817364] XFS (loop5): Mounting V4 Filesystem [ 709.850081] XFS (loop2): device supports 512 byte sectors (not 0) [ 709.851063] XFS (loop5): totally zeroed log [ 709.868781] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 709.881732] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 709.903264] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 709.919052] XFS (loop3): Mounting V4 Filesystem [ 709.920563] kauditd_printk_skb: 158 callbacks suppressed [ 709.920578] audit: type=1400 audit(1542156460.807:11722): avc: denied { map } for pid=27267 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 709.954328] XFS (loop3): totally zeroed log [ 709.965697] audit: type=1400 audit(1542156460.847:11723): avc: denied { map } for pid=27267 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 709.984113] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 709.996824] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 710.052310] audit: type=1400 audit(1542156460.847:11724): avc: denied { map } for pid=27267 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:41 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 710.117899] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 710.180400] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 710.253873] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 710.266353] audit: type=1400 audit(1542156460.847:11725): avc: denied { map } for pid=27267 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:41 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 710.354441] XFS (loop4): SB validate failed with error -117. [ 710.406203] audit: type=1400 audit(1542156460.907:11726): avc: denied { map } for pid=27270 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:41 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673d4", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 710.534169] audit: type=1400 audit(1542156460.907:11727): avc: denied { map } for pid=27270 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:41 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 710.641539] audit: type=1400 audit(1542156460.937:11728): avc: denied { map } for pid=27267 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:41 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="7866737f", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 710.674800] audit: type=1400 audit(1542156460.977:11729): avc: denied { map } for pid=27270 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:41 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0xfeffff, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 711.020304] audit: type=1400 audit(1542156460.977:11730): avc: denied { map } for pid=27270 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 711.188989] audit: type=1400 audit(1542156461.017:11731): avc: denied { map } for pid=27267 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 711.512896] XFS (loop3): Mounting V4 Filesystem [ 711.556375] XFS (loop3): totally zeroed log [ 711.602793] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 711.782351] XFS (loop1): device supports 512 byte sectors (not 0) 00:47:42 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 711.936448] XFS (loop2): device supports 512 byte sectors (not 0) 00:47:42 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x2c, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:47:42 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:47:43 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:47:43 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsD', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:47:43 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:47:44 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x60000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 713.319939] XFS (loop3): Mounting V4 Filesystem [ 713.364071] XFS (loop3): totally zeroed log [ 713.400478] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 713.604510] XFS (loop2): device supports 512 byte sectors (not 0) 00:47:44 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 713.743152] XFS (loop1): device supports 512 byte sectors (not 0) 00:47:44 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:47:44 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:47:45 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x5, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 714.660068] XFS (loop4): SB sanity check failed [ 714.668640] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 714.782446] XFS (loop4): Unmount and run xfs_repair [ 714.830341] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 714.908961] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 714.937896] kauditd_printk_skb: 195 callbacks suppressed [ 714.937912] audit: type=1400 audit(1542156465.807:11927): avc: denied { map } for pid=27394 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 715.018402] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 715.073513] XFS (loop1): device supports 512 byte sectors (not 0) [ 715.093945] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 715.177463] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 715.216161] audit: type=1400 audit(1542156465.927:11928): avc: denied { map } for pid=27394 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 715.229309] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 00:47:46 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsE', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 715.356922] audit: type=1400 audit(1542156465.927:11929): avc: denied { map } for pid=27394 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 715.529793] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 715.592672] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 715.605636] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 715.617829] XFS (loop4): SB validate failed with error -117. [ 715.622598] audit: type=1400 audit(1542156465.937:11930): avc: denied { map } for pid=27409 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 715.650956] audit: type=1400 audit(1542156465.947:11931): avc: denied { map } for pid=27390 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:46 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="786673d4", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 715.742371] XFS (loop3): Mounting V4 Filesystem [ 715.798350] audit: type=1400 audit(1542156465.967:11932): avc: denied { map } for pid=27394 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 715.868549] audit: type=1400 audit(1542156465.967:11933): avc: denied { map } for pid=27394 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:46 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 715.966162] XFS (loop3): totally zeroed log [ 716.026077] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 716.067739] audit: type=1400 audit(1542156465.967:11934): avc: denied { map } for pid=27390 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:47 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667303", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 716.211366] audit: type=1400 audit(1542156465.977:11935): avc: denied { map } for pid=27409 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:47 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 716.380400] audit: type=1400 audit(1542156465.977:11936): avc: denied { map } for pid=27409 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:47 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x1000000000000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 717.588122] XFS (loop4): SB sanity check failed [ 717.593238] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 717.760716] XFS (loop4): Unmount and run xfs_repair [ 717.766193] XFS (loop4): First 128 bytes of corrupted metadata buffer: 00:47:48 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x3f00000000000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 717.820479] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 717.902435] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00:47:48 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 717.971252] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 717.982943] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ 00:47:48 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="786673ff", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 718.017315] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 718.065833] XFS (loop3): Mounting V4 Filesystem [ 718.116585] XFS (loop3): totally zeroed log [ 718.124097] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 718.135252] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 718.172670] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 718.181041] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 718.298851] XFS (loop4): SB validate failed with error -117. 00:47:49 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:47:49 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:47:49 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:47:50 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x47030000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 719.517363] XFS (loop5): Mounting V4 Filesystem [ 719.540906] XFS (loop5): totally zeroed log [ 719.600160] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 719.773146] XFS (loop2): device supports 512 byte sectors (not 0) [ 719.847680] XFS (loop4): SB sanity check failed [ 719.856400] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 00:47:50 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 719.931863] XFS (loop4): Unmount and run xfs_repair [ 719.941435] kauditd_printk_skb: 153 callbacks suppressed [ 719.941450] audit: type=1400 audit(1542156470.827:12090): avc: denied { map } for pid=27514 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 719.995981] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 720.020406] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 720.061343] XFS (loop3): Mounting V4 Filesystem [ 720.085766] XFS (loop3): totally zeroed log 00:47:51 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfsz', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:47:51 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\n', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 720.110516] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 720.159772] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 720.181800] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 720.200329] audit: type=1400 audit(1542156470.867:12091): avc: denied { map } for pid=27514 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 720.272098] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 720.346606] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 720.367882] audit: type=1400 audit(1542156470.897:12092): avc: denied { map } for pid=27541 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 720.460984] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 720.530055] audit: type=1400 audit(1542156470.907:12093): avc: denied { map } for pid=27541 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 720.560625] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ 00:47:51 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x8004, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 720.584866] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00:47:51 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 720.650553] XFS (loop4): SB validate failed with error -117. [ 720.675539] audit: type=1400 audit(1542156470.917:12094): avc: denied { map } for pid=27541 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 720.821160] audit: type=1400 audit(1542156470.927:12095): avc: denied { map } for pid=27541 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:51 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 721.042764] audit: type=1400 audit(1542156470.957:12096): avc: denied { map } for pid=27542 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 721.252112] audit: type=1400 audit(1542156470.977:12097): avc: denied { map } for pid=27542 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 721.288661] audit: type=1400 audit(1542156471.017:12098): avc: denied { map } for pid=27542 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 721.316065] audit: type=1400 audit(1542156471.017:12099): avc: denied { map } for pid=27542 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:52 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x6000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 721.555049] XFS (loop5): Mounting V4 Filesystem [ 721.622157] XFS (loop5): totally zeroed log [ 721.670434] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:47:52 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:47:53 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfsH', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:47:53 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667303", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 722.523697] XFS (loop3): Mounting V4 Filesystem [ 722.564651] XFS (loop3): totally zeroed log [ 722.600637] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 722.790403] XFS (loop4): SB sanity check failed [ 722.798322] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 722.813509] XFS (loop4): Unmount and run xfs_repair [ 722.821930] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 722.839695] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 722.850153] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 722.866446] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 722.882141] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 722.893861] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 722.905406] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 722.917254] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 722.928823] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 722.940697] XFS (loop4): SB validate failed with error -117. 00:47:53 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:47:54 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x22000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:47:54 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 723.474151] XFS (loop5): Mounting V4 Filesystem [ 723.520802] XFS (loop5): totally zeroed log [ 723.540493] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:47:54 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:47:55 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x40000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:47:55 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:47:55 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667380", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 724.520440] XFS (loop3): Mounting V4 Filesystem [ 724.545412] XFS (loop3): totally zeroed log [ 724.566466] XFS (loop4): SB sanity check failed [ 724.574748] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 724.623246] XFS (loop4): Unmount and run xfs_repair [ 724.648972] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 724.680872] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 724.731701] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 724.782660] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 724.831505] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 724.881949] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 724.936610] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 724.955714] kauditd_printk_skb: 205 callbacks suppressed [ 724.955740] audit: type=1400 audit(1542156475.837:12305): avc: denied { map } for pid=27680 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 725.024482] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 725.104013] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 725.184298] audit: type=1400 audit(1542156475.877:12306): avc: denied { map } for pid=27681 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 725.228522] XFS (loop4): SB validate failed with error -117. [ 725.234644] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 725.272377] XFS (loop5): Mounting V4 Filesystem [ 725.300945] XFS (loop5): totally zeroed log [ 725.321197] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 725.372297] audit: type=1400 audit(1542156475.877:12307): avc: denied { map } for pid=27667 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:56 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:47:56 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 725.647434] audit: type=1400 audit(1542156475.887:12308): avc: denied { map } for pid=27667 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:56 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:47:56 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x2200, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 725.920367] XFS (loop1): device supports 512 byte sectors (not 0) [ 726.015147] audit: type=1400 audit(1542156475.897:12309): avc: denied { map } for pid=27680 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:57 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="78667301", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 726.219197] audit: type=1400 audit(1542156475.907:12310): avc: denied { map } for pid=27681 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 726.362031] audit: type=1400 audit(1542156475.917:12311): avc: denied { map } for pid=27681 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 726.490339] audit: type=1400 audit(1542156475.917:12312): avc: denied { map } for pid=27680 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:47:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 726.670352] audit: type=1400 audit(1542156475.977:12313): avc: denied { map } for pid=27681 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 726.881033] audit: type=1400 audit(1542156475.977:12314): avc: denied { map } for pid=27680 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 727.099795] XFS (loop3): Mounting V4 Filesystem [ 727.141676] XFS (loop3): totally zeroed log [ 727.150045] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 727.181327] XFS (loop4): SB sanity check failed [ 727.186362] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 727.290414] XFS (loop4): Unmount and run xfs_repair [ 727.308584] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 727.342283] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 727.396337] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00:47:58 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x4000000000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 727.496202] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 727.620346] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ 00:47:58 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 727.720711] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 727.783900] XFS (loop5): Mounting V4 Filesystem [ 727.807865] XFS (loop5): totally zeroed log [ 727.853026] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 727.856608] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 727.927824] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 728.040304] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 728.073675] XFS (loop4): SB validate failed with error -117. 00:47:59 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:47:59 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667380", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 728.284541] XFS (loop2): device supports 512 byte sectors (not 0) 00:47:59 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:47:59 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:47:59 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0xc000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 729.167748] XFS (loop3): Mounting V4 Filesystem [ 729.198084] XFS (loop3): totally zeroed log [ 729.225453] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:48:00 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 729.865923] XFS (loop2): device supports 512 byte sectors (not 0) [ 729.914574] XFS (loop1): device supports 512 byte sectors (not 0) [ 729.926068] XFS (loop4): SB sanity check failed [ 729.931375] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 729.942852] XFS (loop4): Unmount and run xfs_repair [ 729.948210] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 729.959893] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 729.992521] kauditd_printk_skb: 163 callbacks suppressed [ 729.992546] audit: type=1400 audit(1542156480.877:12478): avc: denied { map } for pid=27819 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 730.133424] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 730.148232] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 730.169380] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 730.183859] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 730.198407] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 730.209851] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ 00:48:01 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x8, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:48:01 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 730.485827] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 730.534644] XFS (loop4): SB validate failed with error -117. [ 730.550291] audit: type=1400 audit(1542156480.887:12479): avc: denied { map } for pid=27812 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:48:01 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 730.708080] audit: type=1400 audit(1542156480.897:12480): avc: denied { map } for pid=27825 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:48:01 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 730.832515] audit: type=1400 audit(1542156480.917:12481): avc: denied { map } for pid=27825 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:48:01 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 731.106681] audit: type=1400 audit(1542156480.957:12482): avc: denied { map } for pid=27825 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 731.134100] audit: type=1400 audit(1542156480.967:12483): avc: denied { map } for pid=27825 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 731.162455] audit: type=1400 audit(1542156480.977:12484): avc: denied { map } for pid=27819 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 731.188848] audit: type=1400 audit(1542156481.027:12485): avc: denied { map } for pid=27819 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 731.220920] audit: type=1400 audit(1542156481.057:12486): avc: denied { map } for pid=27819 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 731.249090] audit: type=1400 audit(1542156481.057:12487): avc: denied { map } for pid=27812 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 731.335059] XFS (loop3): Mounting V4 Filesystem [ 731.377157] XFS (loop3): totally zeroed log [ 731.406232] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:48:02 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:48:02 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x100000000000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 732.139958] XFS (loop1): device supports 512 byte sectors (not 0) [ 732.201687] XFS (loop2): device supports 512 byte sectors (not 0) 00:48:03 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\\', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:48:03 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667301", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 732.672022] XFS (loop5): Mounting V4 Filesystem [ 732.691230] XFS (loop5): totally zeroed log [ 732.709645] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 732.788440] XFS (loop4): SB sanity check failed [ 732.793418] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 732.900259] XFS (loop4): Unmount and run xfs_repair [ 732.905340] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 733.030597] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 733.042188] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 733.053610] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 733.065092] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 733.076441] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 733.091197] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 733.102510] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 733.113835] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 733.125611] XFS (loop4): SB validate failed with error -117. 00:48:04 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x347, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:48:04 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:48:04 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673e0", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 733.811733] XFS (loop3): Mounting V4 Filesystem [ 733.846700] XFS (loop3): AIL initialisation failed: error -12 [ 733.908142] XFS (loop3): log mount failed 00:48:05 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 734.515064] XFS (loop5): Mounting V4 Filesystem 00:48:05 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0xffffffff88200000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 734.616413] XFS (loop5): totally zeroed log [ 734.634239] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:48:05 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:48:05 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 735.024718] kauditd_printk_skb: 139 callbacks suppressed [ 735.024733] audit: type=1400 audit(1542156485.907:12627): avc: denied { map } for pid=27963 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:48:05 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667301", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 735.220426] audit: type=1400 audit(1542156485.917:12628): avc: denied { map } for pid=27957 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 735.333017] audit: type=1400 audit(1542156485.947:12629): avc: denied { map } for pid=27963 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 735.455267] audit: type=1400 audit(1542156486.017:12630): avc: denied { map } for pid=27963 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:48:06 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsX', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 735.695522] audit: type=1400 audit(1542156486.017:12631): avc: denied { map } for pid=27963 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 735.757212] XFS (loop3): Mounting V4 Filesystem [ 735.793908] XFS (loop3): totally zeroed log [ 735.830432] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 735.844725] audit: type=1400 audit(1542156486.077:12632): avc: denied { map } for pid=27963 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 736.067064] audit: type=1400 audit(1542156486.147:12633): avc: denied { map } for pid=27963 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:48:07 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 736.195571] XFS (loop1): device supports 512 byte sectors (not 0) [ 736.285945] audit: type=1400 audit(1542156486.147:12634): avc: denied { map } for pid=27963 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:48:07 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x60, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 736.446074] XFS (loop2): device supports 512 byte sectors (not 0) [ 736.455955] audit: type=1400 audit(1542156486.177:12635): avc: denied { map } for pid=27963 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:48:07 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 736.640372] audit: type=1400 audit(1542156486.177:12636): avc: denied { map } for pid=27963 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:48:07 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:48:08 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:48:08 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs4', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 737.800058] XFS (loop3): Mounting V4 Filesystem 00:48:08 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0xffffff7f, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 737.843488] XFS (loop3): totally zeroed log [ 737.864397] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 737.967613] XFS (loop1): device supports 512 byte sectors (not 0) 00:48:09 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:48:09 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 738.313745] XFS (loop2): device supports 512 byte sectors (not 0) 00:48:09 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:48:09 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0xb00, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 738.745798] XFS (loop5): Mounting V4 Filesystem [ 738.769662] XFS (loop5): totally zeroed log [ 738.779958] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:48:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 739.630362] XFS (loop3): Mounting V4 Filesystem [ 739.675013] XFS (loop3): totally zeroed log [ 739.682740] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:48:10 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:48:10 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 740.013902] XFS (loop1): device supports 512 byte sectors (not 0) [ 740.105868] kauditd_printk_skb: 208 callbacks suppressed [ 740.105883] audit: type=1400 audit(1542156490.987:12821): avc: denied { map } for pid=28119 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 740.261229] audit: type=1400 audit(1542156491.017:12822): avc: denied { map } for pid=28119 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:48:11 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x6000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:48:11 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 740.423401] audit: type=1400 audit(1542156491.037:12823): avc: denied { map } for pid=28119 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 740.502921] XFS (loop2): device supports 512 byte sectors (not 0) [ 740.620301] audit: type=1400 audit(1542156491.067:12824): avc: denied { map } for pid=28119 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 740.654379] XFS (loop5): Mounting V4 Filesystem [ 740.704321] XFS (loop5): totally zeroed log 00:48:11 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 740.730425] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 740.820172] audit: type=1400 audit(1542156491.107:12825): avc: denied { map } for pid=28119 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 740.998608] audit: type=1400 audit(1542156491.137:12826): avc: denied { map } for pid=28119 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:48:12 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsC', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 741.210094] XFS (loop4): SB sanity check failed [ 741.215055] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 741.238756] audit: type=1400 audit(1542156491.137:12827): avc: denied { map } for pid=28119 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 741.317592] XFS (loop4): Unmount and run xfs_repair [ 741.361492] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 741.384791] audit: type=1400 audit(1542156491.247:12828): avc: denied { map } for pid=28119 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 741.419571] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 741.470802] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 741.513964] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 741.528144] XFS (loop3): Mounting V4 Filesystem [ 741.610913] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 741.629020] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 741.635358] XFS (loop3): totally zeroed log [ 741.643623] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 741.681892] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 741.695554] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 741.730015] audit: type=1400 audit(1542156491.267:12829): avc: denied { map } for pid=28119 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 741.781464] XFS (loop4): SB validate failed with error -117. [ 741.854011] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 741.966580] audit: type=1400 audit(1542156491.277:12830): avc: denied { map } for pid=28128 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:48:13 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x1200, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:48:13 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:48:13 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 742.368642] XFS (loop1): device supports 512 byte sectors (not 0) 00:48:13 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 742.539679] XFS (loop2): device supports 512 byte sectors (not 0) 00:48:13 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:48:14 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x4703, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:48:14 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 743.802571] XFS (loop4): SB sanity check failed [ 743.807614] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 743.886655] XFS (loop4): Unmount and run xfs_repair [ 743.920126] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 743.936908] XFS (loop3): Mounting V4 Filesystem [ 743.955101] XFS (loop3): totally zeroed log [ 743.978530] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 743.987185] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 744.032882] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 744.086232] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 744.134452] XFS (loop2): device supports 512 byte sectors (not 0) [ 744.158505] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 744.224466] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 00:48:15 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 744.281307] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 744.283606] XFS (loop1): device supports 512 byte sectors (not 0) [ 744.349232] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ 00:48:15 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 744.427648] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 744.483123] XFS (loop4): SB validate failed with error -117. 00:48:15 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:48:15 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 745.113686] kauditd_printk_skb: 157 callbacks suppressed [ 745.113702] audit: type=1400 audit(1542156495.997:12988): avc: denied { map } for pid=28266 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:48:16 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x2c00, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 745.314161] audit: type=1400 audit(1542156496.057:12989): avc: denied { map } for pid=28270 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 745.349963] XFS (loop5): Mounting V4 Filesystem [ 745.397532] XFS (loop5): totally zeroed log [ 745.434419] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 745.559080] audit: type=1400 audit(1542156496.057:12990): avc: denied { map } for pid=28270 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 745.710163] XFS (loop3): Mounting V4 Filesystem [ 745.738789] XFS (loop3): totally zeroed log 00:48:16 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 745.764683] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 745.766321] audit: type=1400 audit(1542156496.137:12991): avc: denied { map } for pid=28270 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 745.873404] XFS (loop2): device supports 512 byte sectors (not 0) 00:48:16 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 746.038265] audit: type=1400 audit(1542156496.147:12992): avc: denied { map } for pid=28277 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 746.092773] XFS (loop4): SB sanity check failed [ 746.097720] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 746.117629] XFS (loop1): device supports 512 byte sectors (not 0) 00:48:17 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 746.174292] audit: type=1400 audit(1542156496.157:12993): avc: denied { map } for pid=28270 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 746.181059] XFS (loop4): Unmount and run xfs_repair [ 746.321383] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 746.345513] audit: type=1400 audit(1542156496.167:12994): avc: denied { map } for pid=28277 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 746.370392] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 00:48:17 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 746.430405] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 746.519886] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 746.561134] audit: type=1400 audit(1542156496.227:12995): avc: denied { map } for pid=28277 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:48:17 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x346, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 746.613095] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 746.709405] audit: type=1400 audit(1542156496.227:12996): avc: denied { map } for pid=28277 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 746.730308] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 746.835384] audit: type=1400 audit(1542156496.247:12997): avc: denied { map } for pid=28270 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 746.970979] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 747.000329] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 747.062881] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 747.112110] XFS (loop4): SB validate failed with error -117. [ 747.277151] XFS (loop5): Mounting V4 Filesystem [ 747.332262] XFS (loop5): totally zeroed log [ 747.343529] XFS (loop2): device supports 512 byte sectors (not 0) 00:48:18 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667301", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 747.374095] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:48:18 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 747.825575] XFS (loop3): Mounting V4 Filesystem 00:48:18 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="7866738b", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 747.885351] XFS (loop3): AIL initialisation failed: error -12 [ 747.959826] XFS (loop3): log mount failed 00:48:19 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="7866730f", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:48:19 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x1200000000000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 748.301122] XFS (loop1): device supports 512 byte sectors (not 0) 00:48:19 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 749.308747] XFS (loop2): device supports 512 byte sectors (not 0) 00:48:20 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673c2", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:48:20 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:48:20 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x8004000000000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 750.133879] kauditd_printk_skb: 177 callbacks suppressed [ 750.133896] audit: type=1400 audit(1542156501.017:13175): avc: denied { map } for pid=28431 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:48:21 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 750.551461] audit: type=1400 audit(1542156501.017:13176): avc: denied { map } for pid=28431 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:48:21 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667303", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 750.700918] audit: type=1400 audit(1542156501.017:13177): avc: denied { map } for pid=28431 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 750.860382] audit: type=1400 audit(1542156501.137:13178): avc: denied { map } for pid=28433 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 750.972431] XFS (loop1): device supports 512 byte sectors (not 0) [ 751.071727] audit: type=1400 audit(1542156501.157:13179): avc: denied { map } for pid=28436 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 751.247885] audit: type=1400 audit(1542156501.157:13180): avc: denied { map } for pid=28436 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:48:22 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 751.474408] audit: type=1400 audit(1542156501.177:13181): avc: denied { map } for pid=28436 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:48:22 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0xb00000000000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 751.648606] XFS (loop2): device supports 512 byte sectors (not 0) [ 751.682940] audit: type=1400 audit(1542156501.177:13182): avc: denied { map } for pid=28436 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:48:22 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\\', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:48:22 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673ff", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 751.931600] audit: type=1400 audit(1542156501.207:13183): avc: denied { map } for pid=28436 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 752.074336] XFS (loop5): Mounting V4 Filesystem [ 752.076508] audit: type=1400 audit(1542156501.217:13184): avc: denied { map } for pid=28436 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 752.123799] XFS (loop5): totally zeroed log [ 752.154626] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:48:23 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 752.934693] XFS (loop1): device supports 512 byte sectors (not 0) 00:48:23 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x9000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:48:24 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:48:24 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:48:24 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 754.157678] XFS (loop5): Mounting V4 Filesystem [ 754.206410] XFS (loop5): totally zeroed log [ 754.234650] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:48:25 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs%', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:48:25 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x500, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:48:25 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 754.837960] XFS (loop3): Mounting V4 Filesystem [ 754.893925] XFS (loop3): totally zeroed log [ 754.916145] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 755.191910] kauditd_printk_skb: 212 callbacks suppressed [ 755.191927] audit: type=1400 audit(1542156506.077:13346): avc: denied { map } for pid=28542 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 755.275073] XFS (loop4): SB sanity check failed [ 755.280034] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 755.301937] audit: type=1400 audit(1542156506.107:13347): avc: denied { map } for pid=28542 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:48:26 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 755.354995] XFS (loop1): device supports 512 byte sectors (not 0) [ 755.371250] XFS (loop4): Unmount and run xfs_repair [ 755.380100] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 755.443343] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 755.546619] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 755.571957] audit: type=1400 audit(1542156506.397:13348): avc: denied { map } for pid=28577 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:48:26 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0xa, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 755.627858] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 00:48:26 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 755.722222] audit: type=1400 audit(1542156506.397:13349): avc: denied { map } for pid=28577 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 755.744606] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 755.848921] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 755.899387] XFS (loop5): Mounting V4 Filesystem [ 755.925775] audit: type=1400 audit(1542156506.417:13350): avc: denied { map } for pid=28577 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 755.943571] XFS (loop5): totally zeroed log [ 756.017106] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 756.033481] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 756.050433] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 756.050953] audit: type=1400 audit(1542156506.467:13351): avc: denied { map } for pid=28577 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 756.091723] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 756.165129] audit: type=1400 audit(1542156506.557:13352): avc: denied { map } for pid=28577 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 756.265771] XFS (loop4): SB validate failed with error -117. [ 756.323091] audit: type=1400 audit(1542156506.577:13353): avc: denied { map } for pid=28577 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 756.350905] audit: type=1400 audit(1542156506.577:13354): avc: denied { map } for pid=28583 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 756.377237] audit: type=1400 audit(1542156506.577:13355): avc: denied { map } for pid=28583 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:48:27 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:48:27 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:48:27 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 757.150432] XFS (loop3): Mounting V4 Filesystem 00:48:28 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x600, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 757.217348] XFS (loop1): device supports 512 byte sectors (not 0) [ 757.252043] XFS (loop3): AIL initialisation failed: error -12 [ 757.258311] XFS (loop3): log mount failed 00:48:28 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:48:28 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 757.889383] XFS (loop5): Mounting V4 Filesystem [ 757.948629] XFS (loop5): totally zeroed log [ 757.963312] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 758.003939] XFS (loop4): SB sanity check failed [ 758.011981] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 758.052304] XFS (loop4): Unmount and run xfs_repair [ 758.060636] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 758.070510] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 758.082090] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 758.093604] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 758.115097] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 758.126683] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 758.141773] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 758.153541] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 758.164979] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 758.176744] XFS (loop4): SB validate failed with error -117. 00:48:29 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs/', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:48:29 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 758.843090] XFS (loop2): device supports 512 byte sectors (not 0) 00:48:29 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0xc00, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:48:30 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 759.237466] XFS (loop3): Mounting V4 Filesystem [ 759.267086] XFS (loop3): totally zeroed log [ 759.300313] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 759.381713] XFS (loop1): device supports 512 byte sectors (not 0) 00:48:30 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:48:30 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:48:31 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x40000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 760.182577] XFS (loop4): SB sanity check failed [ 760.188663] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 760.224216] XFS (loop4): Unmount and run xfs_repair [ 760.233675] kauditd_printk_skb: 144 callbacks suppressed [ 760.233691] audit: type=1400 audit(1542156511.117:13500): avc: denied { map } for pid=28708 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 760.302712] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 760.370354] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 760.416575] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 760.441451] audit: type=1400 audit(1542156511.117:13501): avc: denied { map } for pid=28717 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 760.505135] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 760.581743] XFS (loop2): device supports 512 byte sectors (not 0) 00:48:31 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsB', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 760.671396] audit: type=1400 audit(1542156511.117:13502): avc: denied { map } for pid=28717 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 760.709823] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ 00:48:31 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673ff", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 760.866646] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 760.881993] audit: type=1400 audit(1542156511.117:13503): avc: denied { map } for pid=28705 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 760.909502] audit: type=1400 audit(1542156511.167:13504): avc: denied { map } for pid=28705 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 760.937955] audit: type=1400 audit(1542156511.167:13505): avc: denied { map } for pid=28717 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 760.968996] audit: type=1400 audit(1542156511.187:13506): avc: denied { map } for pid=28708 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 760.972309] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 761.003397] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 761.019853] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 761.031719] XFS (loop4): SB validate failed with error -117. 00:48:32 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 761.200301] audit: type=1400 audit(1542156511.187:13507): avc: denied { map } for pid=28717 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 761.441715] audit: type=1400 audit(1542156511.207:13508): avc: denied { map } for pid=28708 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 761.532407] XFS (loop1): device supports 512 byte sectors (not 0) [ 761.580935] audit: type=1400 audit(1542156511.247:13509): avc: denied { map } for pid=28721 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 761.715813] XFS (loop3): Mounting V4 Filesystem 00:48:32 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0xfeffffff, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 761.831735] XFS (loop3): AIL initialisation failed: error -12 [ 761.838044] XFS (loop3): log mount failed 00:48:32 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:48:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667388", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 762.795585] XFS (loop4): SB sanity check failed [ 762.800800] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 762.890601] XFS (loop4): Unmount and run xfs_repair [ 762.895863] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 762.927304] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 762.978185] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00:48:33 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:48:34 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 763.106118] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 763.183990] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 763.242900] XFS (loop1): device supports 512 byte sectors (not 0) 00:48:34 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0xff01, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 763.290473] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 763.341508] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 763.392250] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 763.471696] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 763.510176] XFS (loop4): SB validate failed with error -117. 00:48:34 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:48:34 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 764.475941] XFS (loop5): Mounting V4 Filesystem 00:48:35 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 764.515396] XFS (loop5): totally zeroed log [ 764.562955] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 764.605158] XFS (loop2): device supports 512 byte sectors (not 0) 00:48:35 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x900, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:48:35 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:48:35 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 765.263774] XFS (loop1): device supports 512 byte sectors (not 0) [ 765.362176] XFS (loop4): SB sanity check failed [ 765.366919] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 765.422133] XFS (loop4): Unmount and run xfs_repair 00:48:36 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfsp', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 765.462235] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 765.496300] kauditd_printk_skb: 178 callbacks suppressed [ 765.496315] audit: type=1400 audit(1542156516.377:13688): avc: denied { map } for pid=28865 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 765.545264] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 765.607767] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 765.645527] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 765.693929] audit: type=1400 audit(1542156516.417:13689): avc: denied { map } for pid=28867 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 765.706453] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 765.814813] XFS (loop3): Mounting V4 Filesystem [ 765.838326] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 765.867114] XFS (loop3): totally zeroed log [ 765.880077] audit: type=1400 audit(1542156516.417:13690): avc: denied { map } for pid=28867 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 765.898243] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 765.914088] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 766.013422] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 766.036568] audit: type=1400 audit(1542156516.427:13691): avc: denied { map } for pid=28865 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:48:36 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x8cffffff, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 766.059689] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 766.069655] XFS (loop4): SB validate failed with error -117. 00:48:37 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 766.237946] audit: type=1400 audit(1542156516.457:13692): avc: denied { map } for pid=28865 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 766.400479] audit: type=1400 audit(1542156516.457:13693): avc: denied { map } for pid=28867 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 766.448472] audit: type=1400 audit(1542156516.467:13694): avc: denied { map } for pid=28865 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:48:37 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs6', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 766.589757] audit: type=1400 audit(1542156516.477:13695): avc: denied { map } for pid=28867 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 766.681758] audit: type=1400 audit(1542156516.527:13696): avc: denied { map } for pid=28867 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 766.710284] XFS (loop2): device supports 512 byte sectors (not 0) [ 766.729211] XFS (loop5): Mounting V4 Filesystem [ 766.780423] XFS (loop5): totally zeroed log [ 766.817208] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 766.902726] audit: type=1400 audit(1542156516.527:13697): avc: denied { map } for pid=28865 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:48:38 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:48:38 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsH', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:48:38 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x80040000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:48:38 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="786673f6", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 767.755850] XFS (loop4): SB sanity check failed [ 767.770465] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 767.840311] XFS (loop4): Unmount and run xfs_repair [ 767.847429] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 767.898203] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 767.934791] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 768.000509] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 768.043431] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 768.112033] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 768.201481] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 768.277897] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 768.322032] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 768.393707] XFS (loop4): SB validate failed with error -117. 00:48:39 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673ff", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:48:39 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 769.124798] XFS (loop2): device supports 512 byte sectors (not 0) 00:48:40 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x2000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:48:40 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667317", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:48:40 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673f0", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 770.046679] XFS (loop3): Mounting V4 Filesystem [ 770.074016] XFS (loop3): totally zeroed log 00:48:41 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 770.113572] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:48:41 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667384", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 770.517345] kauditd_printk_skb: 203 callbacks suppressed [ 770.517361] audit: type=1400 audit(1542156521.397:13901): avc: denied { map } for pid=28976 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:48:41 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x2c00000000000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 770.730636] audit: type=1400 audit(1542156521.467:13902): avc: denied { map } for pid=28991 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 770.871517] audit: type=1400 audit(1542156521.477:13903): avc: denied { map } for pid=28991 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:48:42 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673f6", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 771.115506] audit: type=1400 audit(1542156521.487:13904): avc: denied { map } for pid=28998 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 771.191434] audit: type=1400 audit(1542156521.497:13905): avc: denied { map } for pid=28998 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 771.411134] audit: type=1400 audit(1542156521.527:13906): avc: denied { map } for pid=28998 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:48:42 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 771.553158] audit: type=1400 audit(1542156521.537:13907): avc: denied { map } for pid=28998 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 771.582856] audit: type=1400 audit(1542156521.737:13908): avc: denied { map } for pid=29001 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 771.611617] audit: type=1400 audit(1542156521.737:13909): avc: denied { map } for pid=28998 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 771.639576] audit: type=1400 audit(1542156521.777:13910): avc: denied { map } for pid=29001 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:48:42 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 772.089733] XFS (loop1): device supports 512 byte sectors (not 0) 00:48:43 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:48:43 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x500000000000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:48:43 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667302", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 773.113175] XFS (loop2): device supports 512 byte sectors (not 0) 00:48:44 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsL', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 773.594569] XFS (loop5): Mounting V4 Filesystem 00:48:44 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="7866737f", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 773.631629] XFS (loop5): totally zeroed log [ 773.657633] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 773.765871] XFS (loop1): device supports 512 byte sectors (not 0) 00:48:44 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x2000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:48:45 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:48:45 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:48:45 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667385", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:48:46 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x2088ffffffff, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 775.524513] kauditd_printk_skb: 205 callbacks suppressed [ 775.524528] audit: type=1400 audit(1542156526.407:14116): avc: denied { map } for pid=29107 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:48:46 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673ff", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 775.704672] audit: type=1400 audit(1542156526.427:14117): avc: denied { map } for pid=29104 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 775.802577] XFS (loop5): Mounting V4 Filesystem [ 775.893148] XFS (loop5): totally zeroed log [ 775.946847] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 775.953267] audit: type=1400 audit(1542156526.427:14118): avc: denied { map } for pid=29104 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 775.983071] audit: type=1400 audit(1542156526.447:14119): avc: denied { map } for pid=29107 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 776.010837] audit: type=1400 audit(1542156526.467:14120): avc: denied { map } for pid=29107 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 776.046983] audit: type=1400 audit(1542156526.467:14121): avc: denied { map } for pid=29103 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 776.076101] audit: type=1400 audit(1542156526.477:14122): avc: denied { map } for pid=29103 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 776.108750] audit: type=1400 audit(1542156526.477:14123): avc: denied { map } for pid=29107 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 776.138763] XFS (loop1): device supports 512 byte sectors (not 0) 00:48:47 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 776.142782] audit: type=1400 audit(1542156526.547:14124): avc: denied { map } for pid=29107 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 776.303412] audit: type=1400 audit(1542156526.697:14125): avc: denied { map } for pid=29107 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:48:47 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673d0", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:48:47 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs!', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:48:47 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x200000000000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:48:48 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 777.698547] XFS (loop2): device supports 512 byte sectors (not 0) 00:48:48 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:48:48 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\r', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:48:49 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x4603000000000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:48:49 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673b6", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:48:49 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 779.065074] XFS (loop3): Mounting V4 Filesystem [ 779.125933] XFS (loop3): totally zeroed log [ 779.133735] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 779.360472] XFS (loop4): SB sanity check failed [ 779.365611] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 00:48:50 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 779.448721] XFS (loop4): Unmount and run xfs_repair [ 779.497392] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 779.540893] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 779.594151] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 779.660463] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 00:48:50 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x6b6b6b, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 779.720068] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 779.811243] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 779.930869] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 779.945880] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 779.993189] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00:48:50 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 780.041356] XFS (loop4): SB validate failed with error -117. 00:48:51 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs~', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:48:51 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673c7", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 780.545421] kauditd_printk_skb: 208 callbacks suppressed [ 780.545437] audit: type=1400 audit(1542156531.427:14334): avc: denied { map } for pid=29223 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 780.667424] XFS (loop1): device supports 512 byte sectors (not 0) [ 780.680925] audit: type=1400 audit(1542156531.497:14335): avc: denied { map } for pid=29221 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 780.779904] audit: type=1400 audit(1542156531.527:14336): avc: denied { map } for pid=29221 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:48:51 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 781.444034] audit: type=1400 audit(1542156532.327:14337): avc: denied { map } for pid=29246 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:48:52 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x10000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 781.562203] audit: type=1400 audit(1542156532.367:14338): avc: denied { map } for pid=29246 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 781.605286] XFS (loop3): Mounting V4 Filesystem [ 781.652388] XFS (loop3): totally zeroed log [ 781.700728] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 781.706810] audit: type=1400 audit(1542156532.387:14339): avc: denied { map } for pid=29246 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 781.821463] XFS (loop2): device supports 512 byte sectors (not 0) [ 781.889169] audit: type=1400 audit(1542156532.397:14340): avc: denied { map } for pid=29246 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:48:52 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667301", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 782.092739] audit: type=1400 audit(1542156532.487:14341): avc: denied { map } for pid=29255 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:48:53 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 782.282137] audit: type=1400 audit(1542156532.507:14342): avc: denied { map } for pid=29246 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 782.461495] audit: type=1400 audit(1542156532.527:14343): avc: denied { map } for pid=29255 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 782.593760] XFS (loop1): device supports 512 byte sectors (not 0) 00:48:53 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:48:53 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\t', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:48:53 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x20000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:48:53 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 783.727722] XFS (loop2): device supports 512 byte sectors (not 0) 00:48:55 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 784.179272] XFS (loop5): Mounting V4 Filesystem [ 784.220298] XFS (loop5): totally zeroed log [ 784.252911] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:48:55 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:48:55 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0xffff0000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 784.448151] XFS (loop1): device supports 512 byte sectors (not 0) 00:48:55 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:48:55 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:48:55 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:48:56 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x480, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 785.517967] XFS (loop2): device supports 512 byte sectors (not 0) [ 785.596988] kauditd_printk_skb: 155 callbacks suppressed [ 785.597004] audit: type=1400 audit(1542156536.477:14500): avc: denied { map } for pid=29355 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 785.777225] audit: type=1400 audit(1542156536.477:14499): avc: denied { map } for pid=29352 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:48:56 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667302", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 785.906047] XFS (loop3): Mounting V4 Filesystem [ 786.077819] audit: type=1400 audit(1542156536.487:14501): avc: denied { map } for pid=29354 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 786.079633] XFS (loop3): totally zeroed log [ 786.155519] XFS (loop1): device supports 512 byte sectors (not 0) [ 786.183161] XFS (loop5): Mounting V4 Filesystem [ 786.222789] XFS (loop5): totally zeroed log [ 786.242966] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 786.281144] audit: type=1400 audit(1542156536.487:14503): avc: denied { map } for pid=29355 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 786.344287] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 786.432657] XFS (loop4): SB sanity check failed [ 786.437742] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 786.491135] audit: type=1400 audit(1542156536.497:14504): avc: denied { map } for pid=29352 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 786.499513] XFS (loop4): Unmount and run xfs_repair [ 786.595314] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 786.625682] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 00:48:57 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 786.650723] audit: type=1400 audit(1542156536.497:14505): avc: denied { map } for pid=29351 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 786.664494] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 786.710376] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 786.718558] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ 00:48:57 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 786.816657] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 786.861530] audit: type=1400 audit(1542156536.487:14502): avc: denied { map } for pid=29354 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 786.884228] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 00:48:57 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 787.005981] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ 00:48:57 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x6, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 787.092393] audit: type=1400 audit(1542156536.517:14506): avc: denied { map } for pid=29351 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 787.120798] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 787.245102] XFS (loop4): SB validate failed with error -117. [ 787.329437] audit: type=1400 audit(1542156536.567:14507): avc: denied { map } for pid=29354 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 787.532425] audit: type=1400 audit(1542156536.587:14508): avc: denied { map } for pid=29355 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:48:58 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:48:58 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 788.216320] XFS (loop1): device supports 512 byte sectors (not 0) [ 788.307768] XFS (loop3): Mounting V4 Filesystem [ 788.359879] XFS (loop3): totally zeroed log 00:48:59 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 788.392076] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 788.625294] XFS (loop5): Mounting V4 Filesystem [ 788.678005] XFS (loop5): totally zeroed log [ 788.694333] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:48:59 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:48:59 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x800000000000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 789.051151] XFS (loop4): SB sanity check failed [ 789.055987] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 00:49:00 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 789.106909] XFS (loop4): Unmount and run xfs_repair [ 789.141255] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 789.143728] XFS (loop2): device supports 512 byte sectors (not 0) [ 789.180286] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 789.264031] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 789.317377] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 789.382650] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ 00:49:00 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673f4", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 789.465521] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 789.519663] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 789.576769] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 789.632130] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 789.686958] XFS (loop4): SB validate failed with error -117. 00:49:00 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667302", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 789.823125] XFS (loop1): device supports 512 byte sectors (not 0) 00:49:00 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x700000000000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 790.231668] XFS (loop3): Mounting V4 Filesystem 00:49:01 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 790.292648] XFS (loop3): totally zeroed log [ 790.308656] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 790.365027] XFS (loop5): Mounting V4 Filesystem [ 790.402806] XFS (loop5): totally zeroed log [ 790.421718] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:49:01 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 790.622265] kauditd_printk_skb: 127 callbacks suppressed [ 790.622280] audit: type=1400 audit(1542156541.507:14636): avc: denied { map } for pid=29539 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:49:01 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 790.817602] audit: type=1400 audit(1542156541.517:14637): avc: denied { map } for pid=29532 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 791.002189] audit: type=1400 audit(1542156541.537:14638): avc: denied { map } for pid=29539 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 791.192137] audit: type=1400 audit(1542156541.537:14639): avc: denied { map } for pid=29539 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 791.223854] audit: type=1400 audit(1542156541.547:14640): avc: denied { map } for pid=29545 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:49:02 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x300, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 791.613528] audit: type=1400 audit(1542156541.547:14641): avc: denied { map } for pid=29545 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 791.782392] audit: type=1400 audit(1542156541.547:14642): avc: denied { map } for pid=29545 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 791.810061] audit: type=1400 audit(1542156541.557:14643): avc: denied { map } for pid=29540 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 791.835610] audit: type=1400 audit(1542156541.557:14644): avc: denied { map } for pid=29540 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:49:02 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673fb", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 791.996580] audit: type=1400 audit(1542156541.557:14645): avc: denied { map } for pid=29540 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:49:03 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="7866730e", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 792.453138] XFS (loop1): device supports 512 byte sectors (not 0) [ 792.484827] XFS (loop5): Mounting V4 Filesystem [ 792.517153] XFS (loop5): totally zeroed log [ 792.557406] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 792.578265] XFS (loop3): Mounting V4 Filesystem [ 792.614253] XFS (loop3): totally zeroed log [ 792.647719] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:49:03 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:49:03 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsh', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:49:03 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667304", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:49:03 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x1000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:49:04 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs,', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:49:05 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x2, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 794.277742] XFS (loop1): device supports 512 byte sectors (not 0) 00:49:05 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs&', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:49:05 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="7866730f", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:49:05 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673e0", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:49:06 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 795.736154] kauditd_printk_skb: 190 callbacks suppressed [ 795.736169] audit: type=1400 audit(1542156546.617:14836): avc: denied { map } for pid=29657 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:49:06 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x3, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 796.024026] audit: type=1400 audit(1542156546.647:14837): avc: denied { map } for pid=29645 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 796.112942] audit: type=1400 audit(1542156546.657:14838): avc: denied { map } for pid=29657 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 796.138580] audit: type=1400 audit(1542156546.677:14839): avc: denied { map } for pid=29645 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 796.176567] audit: type=1400 audit(1542156546.687:14840): avc: denied { map } for pid=29657 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 796.208270] audit: type=1400 audit(1542156546.697:14841): avc: denied { map } for pid=29658 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 796.233910] audit: type=1400 audit(1542156546.717:14842): avc: denied { map } for pid=29658 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 796.263095] audit: type=1400 audit(1542156546.717:14843): avc: denied { map } for pid=29657 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 796.560541] audit: type=1400 audit(1542156546.717:14844): avc: denied { map } for pid=29658 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:49:07 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667302", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:49:07 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 796.749846] audit: type=1400 audit(1542156546.717:14845): avc: denied { map } for pid=29658 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 796.887647] XFS (loop3): Mounting V4 Filesystem [ 796.914185] XFS (loop3): totally zeroed log [ 796.922992] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:49:08 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:49:08 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:49:08 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:49:08 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x10, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 798.358138] XFS (loop2): device supports 512 byte sectors (not 0) [ 798.627563] XFS (loop1): device supports 512 byte sectors (not 0) 00:49:09 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:49:09 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 798.883421] XFS (loop5): Mounting V4 Filesystem [ 798.920787] XFS (loop5): totally zeroed log [ 798.936560] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:49:09 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x9, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:49:10 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 799.194217] XFS (loop3): Mounting V4 Filesystem [ 799.247180] XFS (loop3): totally zeroed log [ 799.257558] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:49:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667303", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:49:10 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:49:11 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x600000000000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 800.336054] XFS (loop2): device supports 512 byte sectors (not 0) [ 800.396627] XFS (loop1): device supports 512 byte sectors (not 0) [ 800.529879] XFS (loop4): SB sanity check failed 00:49:11 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 800.566811] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 800.654726] XFS (loop4): Unmount and run xfs_repair [ 800.676333] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 800.749965] kauditd_printk_skb: 173 callbacks suppressed [ 800.749980] audit: type=1400 audit(1542156551.627:15019): avc: denied { map } for pid=29804 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 800.787614] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 00:49:11 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 800.851240] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 800.862510] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 800.873798] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 800.884998] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 800.896537] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 800.911033] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 800.924348] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 800.939022] audit: type=1400 audit(1542156551.657:15020): avc: denied { map } for pid=29804 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 800.966780] XFS (loop4): SB validate failed with error -117. [ 800.969536] audit: type=1400 audit(1542156551.717:15021): avc: denied { map } for pid=29801 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 801.006712] XFS (loop3): Mounting V4 Filesystem [ 801.032260] audit: type=1400 audit(1542156551.727:15022): avc: denied { map } for pid=29804 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 801.084082] XFS (loop3): totally zeroed log [ 801.095572] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:49:12 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 801.230271] audit: type=1400 audit(1542156551.797:15023): avc: denied { map } for pid=29804 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 801.359194] audit: type=1400 audit(1542156551.807:15024): avc: denied { map } for pid=29801 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:49:12 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667302", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:49:12 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0xffffffff00000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:49:12 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 801.584900] audit: type=1400 audit(1542156551.917:15025): avc: denied { map } for pid=29804 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 801.727842] audit: type=1400 audit(1542156551.957:15026): avc: denied { map } for pid=29801 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 802.126709] audit: type=1400 audit(1542156551.957:15027): avc: denied { map } for pid=29801 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 802.232887] audit: type=1400 audit(1542156551.997:15028): avc: denied { map } for pid=29804 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 802.283125] XFS (loop2): device supports 512 byte sectors (not 0) [ 802.423299] XFS (loop1): device supports 512 byte sectors (not 0) 00:49:13 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 802.679169] XFS (loop4): SB sanity check failed [ 802.700478] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 00:49:13 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x8cffffff00000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 802.770879] XFS (loop4): Unmount and run xfs_repair [ 802.778967] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 802.788948] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 802.806441] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 802.817833] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 802.829275] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 802.891527] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 00:49:13 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="786673ff", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 802.948828] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 803.027333] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 803.172214] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 803.324323] XFS (loop4): SB validate failed with error -117. [ 803.453635] XFS (loop3): Mounting V4 Filesystem 00:49:14 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 803.544234] XFS (loop3): totally zeroed log [ 803.551036] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:49:14 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:49:14 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673a0", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:49:15 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x46030000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 804.262880] XFS (loop2): device supports 512 byte sectors (not 0) 00:49:15 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 804.940322] XFS (loop4): SB sanity check failed [ 804.946462] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 805.017041] XFS (loop4): Unmount and run xfs_repair [ 805.027750] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 805.124208] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 805.212884] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 805.221145] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 805.232545] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 805.243957] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 805.255436] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 805.266816] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 805.278199] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 805.289564] XFS (loop4): SB validate failed with error -117. 00:49:16 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="78667303", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:49:16 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 805.574814] XFS (loop5): Mounting V4 Filesystem [ 805.608666] XFS (loop5): totally zeroed log [ 805.633970] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:49:16 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0xc, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 805.782502] kauditd_printk_skb: 170 callbacks suppressed [ 805.782519] audit: type=1400 audit(1542156556.667:15199): avc: denied { map } for pid=29934 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:49:17 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673ff", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:49:17 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667383", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 806.140671] audit: type=1400 audit(1542156556.667:15200): avc: denied { map } for pid=29934 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 806.306861] XFS (loop2): device supports 512 byte sectors (not 0) [ 806.325989] audit: type=1400 audit(1542156556.787:15201): avc: denied { map } for pid=29934 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 806.491914] audit: type=1400 audit(1542156556.787:15202): avc: denied { map } for pid=29934 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 806.679040] audit: type=1400 audit(1542156557.267:15203): avc: denied { map } for pid=29958 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 806.709066] XFS (loop4): SB sanity check failed [ 806.713962] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 00:49:17 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 806.776723] XFS (loop4): Unmount and run xfs_repair [ 806.838189] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 806.875252] audit: type=1400 audit(1542156557.297:15204): avc: denied { map } for pid=29958 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 806.906908] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 806.948187] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 807.010714] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 807.039914] audit: type=1400 audit(1542156557.317:15205): avc: denied { map } for pid=29958 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:49:18 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x1e1, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 807.087973] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 807.122018] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 807.179187] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 807.206954] audit: type=1400 audit(1542156557.317:15206): avc: denied { map } for pid=29958 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 807.284551] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 807.353403] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00:49:18 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="78667303", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 807.405640] audit: type=1400 audit(1542156557.347:15207): avc: denied { map } for pid=29958 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 807.430279] XFS (loop4): SB validate failed with error -117. [ 807.582529] audit: type=1400 audit(1542156557.377:15208): avc: denied { map } for pid=29959 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:49:18 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 808.040144] XFS (loop2): device supports 512 byte sectors (not 0) 00:49:19 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:49:19 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667398", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:49:19 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:49:19 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x4000000000000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 809.215519] XFS (loop4): SB sanity check failed [ 809.220819] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 809.328047] XFS (loop4): Unmount and run xfs_repair [ 809.370822] XFS (loop4): First 128 bytes of corrupted metadata buffer: 00:49:20 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\a', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 809.427573] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 809.533911] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 809.600383] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 809.644590] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 809.688254] XFS (loop5): Mounting V4 Filesystem [ 809.743061] XFS (loop5): totally zeroed log [ 809.748410] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 809.768971] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 809.769280] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 809.810565] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 809.885695] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 810.010754] XFS (loop4): SB validate failed with error -117. 00:49:21 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:49:21 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x88200000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:49:21 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667380", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 810.369733] XFS (loop3): Mounting V4 Filesystem [ 810.424493] XFS (loop3): totally zeroed log [ 810.433931] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:49:21 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673ae", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 810.862778] kauditd_printk_skb: 170 callbacks suppressed [ 810.862793] audit: type=1400 audit(1542156561.747:15379): avc: denied { map } for pid=30072 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 810.960196] audit: type=1400 audit(1542156561.747:15380): avc: denied { map } for pid=30075 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 810.984084] audit: type=1400 audit(1542156561.747:15381): avc: denied { map } for pid=30075 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 810.984114] audit: type=1400 audit(1542156561.797:15382): avc: denied { map } for pid=30072 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:49:21 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 811.150713] audit: type=1400 audit(1542156561.837:15383): avc: denied { map } for pid=30075 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 811.320276] audit: type=1400 audit(1542156561.847:15384): avc: denied { map } for pid=30075 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:49:22 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\'', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 811.510375] audit: type=1400 audit(1542156561.927:15385): avc: denied { map } for pid=30075 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 811.676088] audit: type=1400 audit(1542156561.937:15386): avc: denied { map } for pid=30072 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:49:22 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0xfffffff6, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 811.824693] XFS (loop5): Mounting V4 Filesystem [ 811.871820] audit: type=1400 audit(1542156561.937:15387): avc: denied { map } for pid=30072 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 811.902177] XFS (loop5): totally zeroed log [ 811.921638] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 812.047265] audit: type=1400 audit(1542156561.957:15388): avc: denied { map } for pid=30073 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:49:23 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667303", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:49:23 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 812.666110] XFS (loop3): Mounting V4 Filesystem [ 812.693410] XFS (loop3): totally zeroed log [ 812.733979] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:49:24 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:49:24 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\f', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:49:24 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x16, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:49:24 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673c4", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 814.375261] XFS (loop5): Mounting V4 Filesystem [ 814.386761] XFS (loop2): device supports 512 byte sectors (not 0) [ 814.428347] XFS (loop5): totally zeroed log [ 814.465846] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:49:25 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:49:25 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\b', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:49:25 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:49:25 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0xa00000000000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:49:26 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfsL', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 815.937630] kauditd_printk_skb: 208 callbacks suppressed [ 815.937645] audit: type=1400 audit(1542156566.807:15597): avc: denied { map } for pid=30184 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:49:26 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\\', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 816.057008] XFS (loop2): device supports 512 byte sectors (not 0) 00:49:27 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0xe1010000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 816.130978] audit: type=1400 audit(1542156566.897:15598): avc: denied { map } for pid=30184 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 816.319245] audit: type=1400 audit(1542156566.907:15599): avc: denied { map } for pid=30184 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 816.377050] XFS (loop5): Mounting V4 Filesystem 00:49:27 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 816.425987] XFS (loop5): totally zeroed log [ 816.442879] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 816.591908] audit: type=1400 audit(1542156566.997:15600): avc: denied { map } for pid=30184 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:49:27 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 816.796915] audit: type=1400 audit(1542156567.007:15601): avc: denied { map } for pid=30184 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:49:27 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 817.016681] audit: type=1400 audit(1542156567.137:15602): avc: denied { map } for pid=30184 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 817.140871] audit: type=1400 audit(1542156567.147:15603): avc: denied { map } for pid=30184 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 817.186936] audit: type=1400 audit(1542156567.197:15604): avc: denied { map } for pid=30210 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 817.411429] audit: type=1400 audit(1542156567.197:15605): avc: denied { map } for pid=30208 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 817.447646] audit: type=1400 audit(1542156567.227:15606): avc: denied { map } for pid=30208 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:49:28 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:49:28 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0xe101, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 818.054849] XFS (loop2): device supports 512 byte sectors (not 0) 00:49:29 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 818.306685] XFS (loop5): Mounting V4 Filesystem [ 818.352262] XFS (loop5): totally zeroed log 00:49:29 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 818.386484] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 818.558421] XFS (loop4): SB sanity check failed [ 818.563375] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 818.670316] XFS (loop4): Unmount and run xfs_repair 00:49:29 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 818.706283] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 818.770303] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 818.850302] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 818.901425] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 818.983985] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ 00:49:29 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x16000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 819.045442] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 819.246800] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 819.349156] XFS (loop1): device supports 512 byte sectors (not 0) [ 819.359431] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 819.441317] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 819.458295] XFS (loop3): Mounting V4 Filesystem [ 819.497680] XFS (loop3): totally zeroed log [ 819.515064] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 819.525950] XFS (loop4): SB validate failed with error -117. 00:49:30 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:49:30 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:49:30 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 820.198763] XFS (loop2): device supports 512 byte sectors (not 0) [ 820.278138] XFS (loop5): Mounting V4 Filesystem [ 820.305301] XFS (loop5): totally zeroed log [ 820.344154] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:49:31 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:49:31 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x7, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:49:31 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 820.987244] kauditd_printk_skb: 189 callbacks suppressed [ 820.987259] audit: type=1400 audit(1542156571.867:15784): avc: denied { map } for pid=30339 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 821.175872] XFS (loop4): SB sanity check failed [ 821.180893] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 821.186997] audit: type=1400 audit(1542156571.907:15785): avc: denied { map } for pid=30339 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 821.255082] XFS (loop4): Unmount and run xfs_repair [ 821.293214] XFS (loop4): First 128 bytes of corrupted metadata buffer: 00:49:32 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0xfffffe00, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 821.377591] XFS (loop3): Mounting V4 Filesystem [ 821.420942] XFS (loop3): totally zeroed log [ 821.437581] audit: type=1400 audit(1542156571.907:15786): avc: denied { map } for pid=30339 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 821.451977] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 821.494384] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 821.514104] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 821.517794] audit: type=1400 audit(1542156571.917:15787): avc: denied { map } for pid=30343 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 821.565846] audit: type=1400 audit(1542156571.927:15789): avc: denied { map } for pid=30345 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 821.568560] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 821.592615] audit: type=1400 audit(1542156571.917:15788): avc: denied { map } for pid=30343 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 821.617880] XFS (loop1): device supports 512 byte sectors (not 0) [ 821.622476] audit: type=1400 audit(1542156571.947:15790): avc: denied { map } for pid=30345 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 821.674550] XFS (loop2): device supports 512 byte sectors (not 0) [ 821.721910] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 821.733459] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 821.744989] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 821.756513] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 821.768022] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 821.779762] XFS (loop4): SB validate failed with error -117. [ 821.930477] audit: type=1400 audit(1542156571.947:15791): avc: denied { map } for pid=30343 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 821.989653] audit: type=1400 audit(1542156571.967:15792): avc: denied { map } for pid=30345 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:49:32 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 822.059198] audit: type=1400 audit(1542156571.977:15793): avc: denied { map } for pid=30343 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:49:33 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:49:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673c0", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:49:33 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667301", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 822.829611] XFS (loop5): Mounting V4 Filesystem [ 822.873871] XFS (loop5): totally zeroed log [ 822.900512] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:49:34 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673d0", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:49:34 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x22, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 823.253230] XFS (loop1): device supports 512 byte sectors (not 0) [ 823.329824] XFS (loop4): SB sanity check failed [ 823.341939] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 823.439392] XFS (loop4): Unmount and run xfs_repair [ 823.478938] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 823.530606] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 823.538825] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00:49:34 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="78667303", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 823.640302] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 823.766569] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 823.841601] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 823.853238] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 823.864776] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 823.876305] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 823.888059] XFS (loop4): SB validate failed with error -117. 00:49:35 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:49:35 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\a', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:49:35 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x1600000000000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:49:35 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:49:36 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsQ', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:49:36 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs|', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 826.047234] kauditd_printk_skb: 192 callbacks suppressed [ 826.047251] audit: type=1400 audit(1542156576.927:15986): avc: denied { map } for pid=30473 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:49:37 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0xedc000000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 826.195396] XFS (loop4): SB sanity check failed [ 826.200433] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 826.292261] audit: type=1400 audit(1542156577.047:15987): avc: denied { map } for pid=30473 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 826.306008] XFS (loop4): Unmount and run xfs_repair [ 826.320670] audit: type=1400 audit(1542156577.057:15988): avc: denied { map } for pid=30473 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 826.489094] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 826.652241] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 826.690363] audit: type=1400 audit(1542156577.097:15989): avc: denied { map } for pid=30473 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 826.700344] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 826.727892] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 826.746511] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 826.759351] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 826.770873] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 826.776583] XFS (loop3): Mounting V4 Filesystem [ 826.782043] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ 00:49:37 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 826.795235] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 826.863509] XFS (loop4): SB validate failed with error -117. [ 826.894632] XFS (loop3): totally zeroed log [ 826.923222] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:49:37 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 827.006415] audit: type=1400 audit(1542156577.097:15990): avc: denied { map } for pid=30473 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 827.181653] audit: type=1400 audit(1542156577.157:15991): avc: denied { map } for pid=30482 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:49:38 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 827.382565] audit: type=1400 audit(1542156577.177:15992): avc: denied { map } for pid=30482 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 827.555900] audit: type=1400 audit(1542156577.207:15993): avc: denied { map } for pid=30482 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 827.740600] audit: type=1400 audit(1542156577.257:15994): avc: denied { map } for pid=30482 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:49:38 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0xf6ffffff00000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 827.950905] audit: type=1400 audit(1542156577.407:15995): avc: denied { map } for pid=30482 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:49:39 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:49:39 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="78667312", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 828.312943] XFS (loop2): device supports 512 byte sectors (not 0) [ 828.655052] XFS (loop4): SB sanity check failed [ 828.664079] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 00:49:39 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 828.750264] XFS (loop3): Mounting V4 Filesystem [ 828.762668] XFS (loop4): Unmount and run xfs_repair [ 828.767725] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 828.777927] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 828.829817] XFS (loop3): totally zeroed log [ 828.866571] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 828.942063] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 828.990357] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 829.051937] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 829.078726] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 829.148797] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 00:49:40 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 829.291827] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ 00:49:40 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0xedc0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 829.391715] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 829.437500] XFS (loop4): SB validate failed with error -117. 00:49:40 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667303", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 829.683647] XFS (loop5): Mounting V4 Filesystem [ 829.696917] XFS (loop5): totally zeroed log [ 829.704467] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 829.999562] XFS (loop2): device supports 512 byte sectors (not 0) 00:49:41 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:49:41 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x2200000000000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:49:41 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="78667380", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:49:41 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 830.906895] XFS (loop3): Mounting V4 Filesystem [ 830.934647] XFS (loop3): totally zeroed log [ 830.980068] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 831.052089] kauditd_printk_skb: 159 callbacks suppressed [ 831.052114] audit: type=1400 audit(1542156581.937:16155): avc: denied { map } for pid=30614 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 831.229882] audit: type=1400 audit(1542156581.967:16156): avc: denied { map } for pid=30611 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:49:42 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 831.391939] audit: type=1400 audit(1542156582.007:16157): avc: denied { map } for pid=30614 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 831.628657] audit: type=1400 audit(1542156582.007:16158): avc: denied { map } for pid=30611 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:49:42 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667301", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 831.873422] XFS (loop2): device supports 512 byte sectors (not 0) [ 831.935404] audit: type=1400 audit(1542156582.017:16159): avc: denied { map } for pid=30614 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:49:42 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x2c000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 832.068004] audit: type=1400 audit(1542156582.027:16160): avc: denied { map } for pid=30611 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 832.108322] XFS (loop5): Mounting V4 Filesystem [ 832.147878] XFS (loop5): totally zeroed log [ 832.196642] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 832.300499] audit: type=1400 audit(1542156582.047:16161): avc: denied { map } for pid=30623 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 832.327269] audit: type=1400 audit(1542156582.057:16162): avc: denied { map } for pid=30623 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 832.352971] audit: type=1400 audit(1542156582.077:16163): avc: denied { map } for pid=30614 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:49:43 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667303", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:49:43 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 832.618328] audit: type=1400 audit(1542156582.077:16164): avc: denied { map } for pid=30614 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:49:43 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs`', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 833.444553] XFS (loop3): Mounting V4 Filesystem [ 833.474041] XFS (loop3): totally zeroed log [ 833.508193] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:49:44 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0xf6ffffff, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:49:44 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:49:44 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\n', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 834.299613] XFS (loop5): Mounting V4 Filesystem [ 834.334277] XFS (loop5): totally zeroed log [ 834.387706] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:49:45 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:49:45 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:49:45 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsG', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:49:46 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x700, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 835.768690] XFS (loop3): Mounting V4 Filesystem [ 835.840463] XFS (loop3): totally zeroed log [ 835.883534] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:49:47 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs#', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:49:47 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667303", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 836.378464] kauditd_printk_skb: 190 callbacks suppressed [ 836.378487] audit: type=1400 audit(1542156587.257:16355): avc: denied { map } for pid=30751 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 836.578628] XFS (loop1): device supports 512 byte sectors (not 0) [ 836.586978] XFS (loop2): device supports 512 byte sectors (not 0) [ 836.595543] audit: type=1400 audit(1542156587.257:16356): avc: denied { map } for pid=30751 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:49:47 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0xff010000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 836.736473] audit: type=1400 audit(1542156587.297:16357): avc: denied { map } for pid=30747 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:49:47 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="786673fb", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:49:47 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 836.929602] audit: type=1400 audit(1542156587.297:16358): avc: denied { map } for pid=30747 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 837.077941] audit: type=1400 audit(1542156587.297:16359): avc: denied { map } for pid=30751 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 837.234254] audit: type=1400 audit(1542156587.307:16360): avc: denied { map } for pid=30751 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:49:48 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 837.381339] audit: type=1400 audit(1542156587.347:16361): avc: denied { map } for pid=30747 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 837.636040] audit: type=1400 audit(1542156587.347:16362): avc: denied { map } for pid=30747 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 837.791448] audit: type=1400 audit(1542156587.377:16363): avc: denied { map } for pid=30751 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 837.955726] audit: audit_backlog=65 > audit_backlog_limit=64 00:49:49 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x2000000000000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 838.619257] XFS (loop5): Mounting V4 Filesystem 00:49:49 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 838.650804] XFS (loop5): totally zeroed log 00:49:49 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 838.707448] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:49:49 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:49:49 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 839.036651] XFS (loop2): device supports 512 byte sectors (not 0) 00:49:50 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:49:50 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x5000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 839.980567] XFS (loop1): device supports 512 byte sectors (not 0) [ 839.984461] XFS (loop4): SB sanity check failed [ 840.029516] XFS (loop3): Mounting V4 Filesystem [ 840.041333] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 840.071624] XFS (loop3): totally zeroed log [ 840.098063] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 840.165100] XFS (loop4): Unmount and run xfs_repair [ 840.199457] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 840.258674] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 00:49:51 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 840.387619] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 840.445119] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 00:49:51 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 840.552577] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 840.663846] XFS (loop5): Mounting V4 Filesystem [ 840.704306] XFS (loop5): totally zeroed log [ 840.714152] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 840.746387] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 840.790360] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 840.798578] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 840.839796] XFS (loop2): device supports 512 byte sectors (not 0) [ 840.936264] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 840.991057] XFS (loop4): SB validate failed with error -117. 00:49:51 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:49:52 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:49:52 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:49:52 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0xfffffffe, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 841.644130] kauditd_printk_skb: 191 callbacks suppressed [ 841.644146] audit: type=1400 audit(1542156592.527:16553): avc: denied { map } for pid=30903 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 841.798682] audit: type=1400 audit(1542156592.527:16554): avc: denied { map } for pid=30903 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 841.827680] XFS (loop1): device supports 512 byte sectors (not 0) [ 841.927951] audit: type=1400 audit(1542156592.527:16555): avc: denied { map } for pid=30903 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 842.049052] XFS (loop3): Mounting V4 Filesystem [ 842.080964] XFS (loop3): totally zeroed log [ 842.087802] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:49:53 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 842.183007] audit: type=1400 audit(1542156592.577:16556): avc: denied { map } for pid=30903 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 842.348394] audit: type=1400 audit(1542156592.657:16557): avc: denied { map } for pid=30903 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 842.492859] audit: type=1400 audit(1542156592.737:16558): avc: denied { map } for pid=30903 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:49:53 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 842.659790] XFS (loop5): Mounting V4 Filesystem [ 842.702523] audit: type=1400 audit(1542156592.747:16559): avc: denied { map } for pid=30903 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 842.708558] XFS (loop5): totally zeroed log [ 842.848140] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 842.891215] audit: type=1400 audit(1542156592.807:16560): avc: denied { map } for pid=30903 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 842.919072] audit: type=1400 audit(1542156592.837:16561): avc: denied { map } for pid=30903 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 842.951281] audit: type=1400 audit(1542156592.867:16562): avc: denied { map } for pid=30915 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 842.963547] XFS (loop2): device supports 512 byte sectors (not 0) [ 842.989043] XFS (loop4): SB sanity check failed [ 843.032024] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 00:49:54 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x3f000000, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 843.145709] XFS (loop4): Unmount and run xfs_repair [ 843.154989] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 843.164876] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 843.176395] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 843.196568] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 843.208044] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 843.237855] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 00:49:54 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 843.294851] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 843.382033] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ 00:49:54 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667301", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 843.469973] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 843.518522] XFS (loop4): SB validate failed with error -117. 00:49:54 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 843.883045] XFS (loop1): device supports 512 byte sectors (not 0) 00:49:55 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="786673ff", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:49:55 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x4603, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 844.366866] XFS (loop3): Mounting V4 Filesystem [ 844.421171] XFS (loop3): totally zeroed log [ 844.452242] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 844.647962] XFS (loop5): Mounting V4 Filesystem [ 844.677364] XFS (loop5): totally zeroed log [ 844.705058] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:49:55 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:49:55 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:49:56 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 845.395098] XFS (loop4): SB sanity check failed [ 845.399969] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 845.497413] XFS (loop4): Unmount and run xfs_repair [ 845.547523] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 845.560327] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 00:49:56 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='Fp\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 845.688110] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 845.782891] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 845.855992] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 845.913748] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 845.997779] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 846.020456] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 846.101539] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 846.151021] XFS (loop4): SB validate failed with error -117. 00:49:57 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="78667305", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:49:57 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 846.289718] XFS (loop3): Mounting V4 Filesystem [ 846.344820] XFS (loop3): totally zeroed log [ 846.376566] XFS (loop5): Mounting V4 Filesystem [ 846.390879] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 846.421381] XFS (loop5): totally zeroed log [ 846.463896] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 846.509191] XFS (loop2): device supports 512 byte sectors (not 0) [ 846.667709] kauditd_printk_skb: 178 callbacks suppressed [ 846.667726] audit: type=1400 audit(1542156597.547:16741): avc: denied { map } for pid=31071 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 846.771298] audit: type=1400 audit(1542156597.557:16742): avc: denied { map } for pid=31080 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 846.798268] audit: type=1400 audit(1542156597.597:16743): avc: denied { map } for pid=31080 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 846.824918] audit: type=1400 audit(1542156597.607:16744): avc: denied { map } for pid=31071 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:49:57 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 846.853451] audit: type=1400 audit(1542156597.627:16745): avc: denied { map } for pid=31068 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 846.881789] audit: type=1400 audit(1542156597.647:16746): avc: denied { map } for pid=31080 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:49:57 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsR', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 846.915785] audit: type=1400 audit(1542156597.677:16747): avc: denied { map } for pid=31080 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 846.951340] audit: type=1400 audit(1542156597.697:16748): avc: denied { map } for pid=31071 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:49:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 847.020288] audit: type=1400 audit(1542156597.757:16749): avc: denied { map } for pid=31068 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 847.169306] audit: type=1400 audit(1542156597.757:16750): avc: denied { map } for pid=31068 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 847.669772] XFS (loop4): SB sanity check failed [ 847.678051] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 847.751738] XFS (loop4): Unmount and run xfs_repair 00:49:58 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='%p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 847.790543] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 847.833591] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 847.902419] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 847.958582] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 848.010748] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 848.075048] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 848.100487] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 848.156082] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 848.250479] XFS (loop3): Mounting V4 Filesystem [ 848.284413] XFS (loop3): totally zeroed log [ 848.294508] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 848.331424] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 848.406597] XFS (loop4): SB validate failed with error -117. [ 848.432863] XFS (loop2): device supports 512 byte sectors (not 0) 00:49:59 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="7866731c", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:49:59 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:49:59 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667380", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:49:59 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673ff", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:49:59 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673ea", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:50:00 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)=',p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 850.137731] XFS (loop3): Mounting V4 Filesystem [ 850.159957] XFS (loop3): totally zeroed log [ 850.175666] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:50:01 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:50:01 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="786673ff", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:50:02 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:50:02 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs:', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:50:02 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 851.671867] kauditd_printk_skb: 239 callbacks suppressed [ 851.671881] audit: type=1400 audit(1542156602.557:16990): avc: denied { map } for pid=31187 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 851.912309] audit: type=1400 audit(1542156602.587:16991): avc: denied { map } for pid=31187 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 851.940443] audit: type=1400 audit(1542156602.587:16992): avc: denied { map } for pid=31187 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 851.968664] audit: type=1400 audit(1542156602.707:16993): avc: denied { map } for pid=31191 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:50:02 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='\np\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 851.995267] audit: type=1400 audit(1542156602.727:16994): avc: denied { map } for pid=31191 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 852.020963] audit: type=1400 audit(1542156602.737:16995): avc: denied { map } for pid=31191 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 852.320289] audit: type=1400 audit(1542156602.747:16996): avc: denied { map } for pid=31187 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 852.550302] audit: type=1400 audit(1542156602.747:16997): avc: denied { map } for pid=31187 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 852.751399] audit: type=1400 audit(1542156602.877:16998): avc: denied { map } for pid=31191 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 852.783578] audit: type=1400 audit(1542156602.907:16999): avc: denied { map } for pid=31187 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 852.933142] XFS (loop3): Mounting V4 Filesystem [ 852.962906] XFS (loop3): totally zeroed log [ 852.969767] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:50:03 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="786673ff", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:50:04 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 853.356530] XFS (loop2): device supports 512 byte sectors (not 0) [ 853.534910] XFS (loop5): Mounting V4 Filesystem [ 853.596199] XFS (loop5): totally zeroed log 00:50:04 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673c0", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 853.632813] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:50:04 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:50:04 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='"p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:50:04 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 854.675791] XFS (loop3): Mounting V4 Filesystem [ 854.703917] XFS (loop3): totally zeroed log [ 854.752989] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:50:06 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:50:06 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:50:06 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)="a77000", 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 855.475150] XFS (loop4): SB sanity check failed [ 855.483151] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 855.642871] XFS (loop4): Unmount and run xfs_repair [ 855.674058] XFS (loop5): Mounting V4 Filesystem [ 855.697524] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 855.741798] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 855.744225] XFS (loop5): totally zeroed log [ 855.749995] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 855.750008] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 855.750021] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 855.750033] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 855.750046] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 855.750059] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 855.750070] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 855.811924] XFS (loop4): SB validate failed with error -117. 00:50:06 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="7866737f", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 855.913947] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:50:07 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:50:07 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs(', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 856.693232] kauditd_printk_skb: 198 callbacks suppressed [ 856.693249] audit: type=1400 audit(1542156607.577:17199): avc: denied { map } for pid=31316 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 856.833042] XFS (loop1): device supports 512 byte sectors (not 0) [ 856.884414] audit: type=1400 audit(1542156607.567:17198): avc: denied { map } for pid=31308 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 856.909367] XFS (loop3): Mounting V4 Filesystem [ 856.932829] XFS (loop3): totally zeroed log [ 856.950691] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 857.076314] audit: type=1400 audit(1542156607.597:17201): avc: denied { map } for pid=31311 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:50:08 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:50:08 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 857.284330] audit: type=1400 audit(1542156607.587:17200): avc: denied { map } for pid=31308 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:50:08 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9,\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 857.570787] audit: type=1400 audit(1542156607.607:17202): avc: denied { map } for pid=31311 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 857.606288] audit: type=1400 audit(1542156607.607:17203): avc: denied { map } for pid=31316 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 857.711806] audit: type=1400 audit(1542156607.617:17204): avc: denied { map } for pid=31307 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 857.777786] audit: type=1400 audit(1542156607.617:17205): avc: denied { map } for pid=31310 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 857.802631] audit: type=1400 audit(1542156607.627:17206): avc: denied { map } for pid=31319 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 857.834324] audit: type=1400 audit(1542156607.637:17207): avc: denied { map } for pid=31319 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:50:08 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667302", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 857.950883] XFS (loop4): SB sanity check failed [ 857.955820] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 858.000438] XFS (loop4): Unmount and run xfs_repair [ 858.005667] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 858.045683] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 858.087036] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 858.133983] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 858.181203] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 858.279842] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 858.377239] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 858.521609] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 858.589923] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 858.636322] XFS (loop4): SB validate failed with error -117. 00:50:09 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:50:09 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 858.943041] XFS (loop1): device supports 512 byte sectors (not 0) [ 859.278019] XFS (loop3): Mounting V4 Filesystem [ 859.365298] XFS (loop3): totally zeroed log [ 859.372131] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:50:10 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 859.500930] kworker/dying (21) used greatest stack depth: 13264 bytes left 00:50:10 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9\x00 ', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:50:10 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="7866731b", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:50:11 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 860.339366] XFS (loop5): Mounting V4 Filesystem [ 860.394355] XFS (loop5): totally zeroed log [ 860.405094] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:50:11 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 860.953376] XFS (loop1): device supports 512 byte sectors (not 0) [ 861.013675] XFS (loop4): SB sanity check failed [ 861.018431] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 00:50:11 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9\n\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 861.100287] XFS (loop4): Unmount and run xfs_repair [ 861.105371] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 861.166758] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 861.224545] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 861.280269] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 861.288472] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ 00:50:12 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 861.400263] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 861.408460] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 861.497217] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 861.653609] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 861.716443] kauditd_printk_skb: 211 callbacks suppressed [ 861.716459] audit: type=1400 audit(1542156612.597:17419): avc: denied { map } for pid=31454 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 861.781230] XFS (loop2): device supports 512 byte sectors (not 0) [ 861.795113] XFS (loop4): SB validate failed with error -117. 00:50:12 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 862.002846] audit: type=1400 audit(1542156612.597:17420): avc: denied { map } for pid=31454 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:50:13 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 862.174971] audit: type=1400 audit(1542156612.607:17421): avc: denied { map } for pid=31451 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:50:13 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667314", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 862.384458] XFS (loop5): Mounting V4 Filesystem [ 862.420535] audit: type=1400 audit(1542156612.637:17422): avc: denied { map } for pid=31451 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 862.451320] XFS (loop5): totally zeroed log [ 862.464255] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 862.608486] audit: type=1400 audit(1542156612.657:17423): avc: denied { map } for pid=31450 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 862.797484] audit: type=1400 audit(1542156612.657:17424): avc: denied { map } for pid=31450 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:50:13 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 862.949670] XFS (loop1): device supports 512 byte sectors (not 0) [ 863.011063] audit: type=1400 audit(1542156612.717:17425): avc: denied { map } for pid=31454 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:50:14 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 863.189444] audit: type=1400 audit(1542156612.747:17426): avc: denied { map } for pid=31451 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 863.372223] XFS (loop4): SB sanity check failed [ 863.376964] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 863.382469] audit: type=1400 audit(1542156612.747:17427): avc: denied { map } for pid=31451 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 863.465475] XFS (loop4): Unmount and run xfs_repair [ 863.502494] XFS (loop4): First 128 bytes of corrupted metadata buffer: 00:50:14 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9"\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 863.557267] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 863.607451] audit: type=1400 audit(1542156612.787:17428): avc: denied { map } for pid=31454 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 863.625236] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 863.705609] XFS (loop3): Mounting V4 Filesystem [ 863.735356] XFS (loop3): totally zeroed log [ 863.747932] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 863.795707] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 863.815891] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 863.877045] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 863.935094] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 863.992301] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 864.052241] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 864.100520] XFS (loop4): SB validate failed with error -117. 00:50:15 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:50:15 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673c4", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:50:15 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673b0", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 864.560187] XFS (loop5): Mounting V4 Filesystem [ 864.611581] XFS (loop5): totally zeroed log [ 864.618750] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 864.719046] XFS (loop1): device supports 512 byte sectors (not 0) 00:50:15 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="78667303", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:50:15 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 865.666231] XFS (loop3): Mounting V4 Filesystem [ 865.696191] XFS (loop3): totally zeroed log 00:50:16 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9%\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 865.728551] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:50:16 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:50:17 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:50:17 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667306", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 866.806791] XFS (loop5): Mounting V4 Filesystem [ 866.825011] kauditd_printk_skb: 253 callbacks suppressed [ 866.825026] audit: type=1400 audit(1542156617.707:17634): avc: denied { map } for pid=31606 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 866.880909] XFS (loop5): totally zeroed log [ 866.898363] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:50:17 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfsh', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 867.070039] audit: type=1400 audit(1542156617.707:17635): avc: denied { map } for pid=31606 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:50:18 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 867.212618] audit: type=1400 audit(1542156617.717:17636): avc: denied { map } for pid=31606 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 867.370276] audit: type=1400 audit(1542156617.717:17637): avc: denied { map } for pid=31606 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 867.540729] audit: type=1400 audit(1542156617.727:17638): avc: denied { map } for pid=31606 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 867.681727] audit: type=1400 audit(1542156617.727:17639): avc: denied { map } for pid=31606 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 867.714571] audit: type=1400 audit(1542156617.737:17640): avc: denied { map } for pid=31606 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 867.744362] audit: type=1400 audit(1542156617.747:17641): avc: denied { map } for pid=31606 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 867.778907] XFS (loop3): Mounting V4 Filesystem [ 867.839810] XFS (loop3): totally zeroed log [ 867.886391] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:50:18 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 868.084379] audit: type=1400 audit(1542156617.747:17642): avc: denied { map } for pid=31606 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 868.273001] XFS (loop2): device supports 512 byte sectors (not 0) [ 868.280310] audit: type=1400 audit(1542156617.757:17643): avc: denied { map } for pid=31606 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:50:19 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667381", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:50:19 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:50:19 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 869.235927] 9pnet: p9_errstr2errno: server reported unknown error 00:50:20 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 869.455561] XFS (loop5): Mounting V4 Filesystem [ 869.479037] XFS (loop5): totally zeroed log [ 869.494618] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:50:20 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:50:20 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 870.291200] XFS (loop2): device supports 512 byte sectors (not 0) [ 870.421274] XFS (loop1): device supports 512 byte sectors (not 0) 00:50:21 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsH', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:50:21 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 870.644305] XFS (loop4): SB sanity check failed [ 870.649291] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 870.693790] 9pnet: p9_errstr2errno: server reported unknown error [ 870.720932] XFS (loop4): Unmount and run xfs_repair [ 870.771549] XFS (loop4): First 128 bytes of corrupted metadata buffer: 00:50:21 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 870.815378] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 870.840467] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 870.898842] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 00:50:21 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 870.995236] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 871.034722] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 871.100323] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 871.218893] XFS (loop5): Mounting V4 Filesystem [ 871.264153] XFS (loop5): totally zeroed log [ 871.293744] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 871.316548] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 871.510278] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 871.518542] XFS (loop4): SB validate failed with error -117. 00:50:22 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:50:22 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 871.834379] kauditd_printk_skb: 185 callbacks suppressed [ 871.834395] audit: type=1400 audit(1542156622.717:17829): avc: denied { map } for pid=31741 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:50:22 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 872.005926] audit: type=1400 audit(1542156622.757:17830): avc: denied { map } for pid=31744 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 872.123374] XFS (loop2): device supports 512 byte sectors (not 0) [ 872.189576] audit: type=1400 audit(1542156622.797:17831): avc: denied { map } for pid=31741 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 872.470353] XFS (loop1): device supports 512 byte sectors (not 0) [ 872.632657] audit: type=1400 audit(1542156622.797:17832): avc: denied { map } for pid=31741 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 872.661688] audit: type=1400 audit(1542156622.807:17833): avc: denied { map } for pid=31752 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 872.687666] audit: type=1400 audit(1542156622.817:17834): avc: denied { map } for pid=31752 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 872.713407] audit: type=1400 audit(1542156622.837:17835): avc: denied { map } for pid=31744 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 872.742724] audit: type=1400 audit(1542156622.847:17836): avc: denied { map } for pid=31744 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:50:23 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 872.770700] audit: type=1400 audit(1542156622.857:17837): avc: denied { map } for pid=31752 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 872.795740] audit: type=1400 audit(1542156622.857:17838): avc: denied { map } for pid=31752 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:50:23 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673fe", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:50:24 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 873.518630] 9pnet: p9_errstr2errno: server reported unknown error [ 873.767343] XFS (loop5): Mounting V4 Filesystem [ 873.796599] XFS (loop5): totally zeroed log 00:50:24 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 873.839895] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 873.897856] XFS (loop4): SB sanity check failed [ 873.903049] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 873.960796] XFS (loop4): Unmount and run xfs_repair [ 873.966136] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 874.025326] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 874.074892] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 874.124808] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 874.162456] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 874.260449] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 00:50:25 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 874.452031] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 874.512883] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 874.568396] XFS (loop2): device supports 512 byte sectors (not 0) [ 874.574871] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 874.701045] XFS (loop4): SB validate failed with error -117. [ 874.750975] XFS (loop1): device supports 512 byte sectors (not 0) 00:50:25 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:50:25 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:50:26 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:50:26 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 875.741030] 9pnet: p9_errstr2errno: server reported unknown error 00:50:26 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)="39708c", 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 876.396932] XFS (loop5): Mounting V4 Filesystem [ 876.449379] XFS (loop5): totally zeroed log [ 876.473847] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 876.559979] XFS (loop4): SB sanity check failed [ 876.565173] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 876.631622] XFS (loop4): Unmount and run xfs_repair [ 876.654055] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 876.703924] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 876.778118] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00:50:27 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 876.825978] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 876.871811] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 876.900835] kauditd_printk_skb: 141 callbacks suppressed [ 876.900851] audit: type=1400 audit(1542156627.787:17980): avc: denied { map } for pid=31851 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 876.920118] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 877.005572] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 877.089842] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 877.130816] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 877.136419] audit: type=1400 audit(1542156627.817:17981): avc: denied { map } for pid=31851 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 877.145448] XFS (loop4): SB validate failed with error -117. [ 877.280696] XFS (loop1): device supports 512 byte sectors (not 0) [ 877.475811] XFS (loop3): Mounting V4 Filesystem 00:50:28 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 877.539147] XFS (loop3): totally zeroed log [ 877.552990] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:50:28 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 877.570348] audit: type=1400 audit(1542156628.327:17982): avc: denied { map } for pid=31896 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 877.592622] XFS (loop2): device supports 512 byte sectors (not 0) [ 877.700281] audit: type=1400 audit(1542156628.327:17983): avc: denied { map } for pid=31896 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 877.897038] audit: type=1400 audit(1542156628.337:17984): avc: denied { map } for pid=31897 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:50:28 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)="3970f6", 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:50:28 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 878.007227] audit: type=1400 audit(1542156628.337:17985): avc: denied { map } for pid=31897 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:50:28 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 878.225138] audit: type=1400 audit(1542156628.337:17986): avc: denied { map } for pid=31897 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 878.391490] audit: type=1400 audit(1542156628.387:17987): avc: denied { map } for pid=31896 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 878.418723] audit: type=1400 audit(1542156628.387:17988): avc: denied { map } for pid=31896 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 878.445908] audit: type=1400 audit(1542156628.397:17989): avc: denied { map } for pid=31897 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 878.630342] XFS (loop5): Mounting V4 Filesystem [ 878.694667] XFS (loop5): totally zeroed log [ 878.763304] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:50:29 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667303", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 879.400732] XFS (loop4): SB sanity check failed [ 879.405821] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 879.465303] XFS (loop1): device supports 512 byte sectors (not 0) [ 879.488038] XFS (loop4): Unmount and run xfs_repair [ 879.547117] XFS (loop2): device supports 512 byte sectors (not 0) [ 879.578196] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 879.690643] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 879.702318] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 879.713948] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 879.725446] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 879.736861] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 879.748337] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 879.880491] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 879.917002] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00:50:30 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 879.939595] XFS (loop3): Mounting V4 Filesystem [ 879.987918] XFS (loop4): SB validate failed with error -117. [ 880.002848] XFS (loop3): totally zeroed log [ 880.044467] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:50:31 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:50:31 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9pF', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:50:31 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673ba", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:50:31 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:50:31 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667301", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 881.224291] XFS (loop1): device supports 512 byte sectors (not 0) [ 881.448717] XFS (loop2): device supports 512 byte sectors (not 0) 00:50:32 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="786673c0", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:50:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 881.903214] XFS (loop3): Mounting V4 Filesystem [ 881.918042] kauditd_printk_skb: 177 callbacks suppressed [ 881.918057] audit: type=1400 audit(1542156632.797:18167): avc: denied { map } for pid=32031 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 881.992939] XFS (loop3): totally zeroed log [ 882.027499] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 882.120854] audit: type=1400 audit(1542156632.807:18168): avc: denied { map } for pid=32020 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 882.392738] audit: type=1400 audit(1542156632.827:18169): avc: denied { map } for pid=32020 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:50:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:50:33 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:50:33 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 882.773739] audit: type=1400 audit(1542156632.827:18170): avc: denied { map } for pid=32031 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 882.936084] audit: type=1400 audit(1542156632.837:18171): avc: denied { map } for pid=32024 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:50:33 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667301", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 883.069170] audit: type=1400 audit(1542156632.837:18172): avc: denied { map } for pid=32031 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 883.280648] audit: type=1400 audit(1542156632.847:18173): avc: denied { map } for pid=32019 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 883.383492] XFS (loop2): device supports 512 byte sectors (not 0) [ 883.481972] audit: type=1400 audit(1542156632.897:18174): avc: denied { map } for pid=32024 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 883.638648] audit: audit_backlog=65 > audit_backlog_limit=64 [ 883.667645] audit: audit_backlog=65 > audit_backlog_limit=64 00:50:34 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 883.826562] XFS (loop3): Mounting V4 Filesystem [ 883.881569] XFS (loop3): totally zeroed log 00:50:34 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 883.902815] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 884.022700] 9pnet: p9_errstr2errno: server reported unknown error 00:50:35 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsd', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 884.268122] XFS (loop4): SB sanity check failed [ 884.273584] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 884.348090] XFS (loop4): Unmount and run xfs_repair [ 884.386469] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 884.472539] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 00:50:35 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 884.600071] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 884.680324] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 884.741349] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 884.810286] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 884.829248] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 884.864985] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 884.975796] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 884.994314] XFS (loop4): SB validate failed with error -117. 00:50:36 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs=', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:50:36 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 885.456164] XFS (loop2): device supports 512 byte sectors (not 0) [ 885.842984] XFS (loop1): device supports 512 byte sectors (not 0) 00:50:36 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:50:37 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 886.260475] 9pnet: p9_errstr2errno: server reported unknown error 00:50:37 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9pG', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:50:37 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 886.924570] kauditd_printk_skb: 185 callbacks suppressed [ 886.924586] audit: type=1400 audit(1542156637.807:18353): avc: denied { map } for pid=32146 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 887.120324] audit: type=1400 audit(1542156637.807:18354): avc: denied { map } for pid=32146 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 887.147152] XFS (loop4): SB sanity check failed [ 887.156122] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 887.207087] XFS (loop4): Unmount and run xfs_repair [ 887.240301] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 887.287299] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 00:50:38 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667318", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 887.353319] audit: type=1400 audit(1542156637.807:18355): avc: denied { map } for pid=32146 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 887.380970] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 887.664523] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 887.774561] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 887.800404] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 887.812638] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 887.840265] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 887.848557] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 887.862262] XFS (loop2): device supports 512 byte sectors (not 0) [ 887.880360] XFS (loop4): SB validate failed with error -117. [ 887.915052] audit: type=1400 audit(1542156637.827:18356): avc: denied { map } for pid=32146 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 888.055966] audit: type=1400 audit(1542156637.867:18357): avc: denied { map } for pid=32146 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 888.201813] audit: type=1400 audit(1542156637.887:18358): avc: denied { map } for pid=32144 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:50:39 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:50:39 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 888.369786] audit: type=1400 audit(1542156637.887:18359): avc: denied { map } for pid=32144 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 888.404999] audit: type=1400 audit(1542156637.937:18360): avc: denied { map } for pid=32146 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 888.433587] audit: type=1400 audit(1542156637.937:18361): avc: denied { map } for pid=32146 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 888.465527] audit: type=1400 audit(1542156637.967:18362): avc: denied { map } for pid=32149 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 888.593229] XFS (loop1): device supports 512 byte sectors (not 0) [ 888.914789] XFS (loop3): Mounting V4 Filesystem 00:50:39 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)="397004", 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 888.966994] XFS (loop3): totally zeroed log 00:50:39 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 889.028199] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:50:40 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673ff", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 889.949510] XFS (loop4): SB sanity check failed [ 889.955879] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 890.036407] XFS (loop4): Unmount and run xfs_repair [ 890.075294] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 890.092567] XFS (loop2): device supports 512 byte sectors (not 0) [ 890.128597] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 890.203705] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 890.271568] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 00:50:41 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667303", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 890.320804] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 890.381999] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 890.443238] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 00:50:41 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 890.526068] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 890.741303] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 890.759922] XFS (loop4): SB validate failed with error -117. [ 890.846874] XFS (loop1): device supports 512 byte sectors (not 0) 00:50:41 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:50:42 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:50:42 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 891.945795] kauditd_printk_skb: 176 callbacks suppressed [ 891.945811] audit: type=1400 audit(1542156642.827:18539): avc: denied { map } for pid=32262 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:50:42 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 892.132555] audit: type=1400 audit(1542156642.877:18540): avc: denied { map } for pid=32260 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 892.217591] XFS (loop5): Mounting V4 Filesystem [ 892.245442] 9pnet: p9_errstr2errno: server reported unknown error [ 892.271953] XFS (loop5): totally zeroed log [ 892.289524] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 892.336860] audit: type=1400 audit(1542156642.907:18541): avc: denied { map } for pid=32260 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 892.394627] 9pnet: p9_errstr2errno: server reported unknown error [ 892.527964] audit: type=1400 audit(1542156642.907:18542): avc: denied { map } for pid=32262 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:50:43 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 892.579086] XFS (loop1): device supports 512 byte sectors (not 0) [ 892.597788] XFS (loop4): SB sanity check failed [ 892.602854] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 00:50:43 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:50:43 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 892.728328] XFS (loop4): Unmount and run xfs_repair [ 892.768477] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 892.779102] audit: type=1400 audit(1542156642.927:18543): avc: denied { map } for pid=32262 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 892.840276] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 892.848482] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 892.910272] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 892.918486] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 892.960288] audit: type=1400 audit(1542156642.937:18544): avc: denied { map } for pid=32268 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:50:43 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 893.029726] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 893.081046] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 893.089297] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 893.140306] audit: type=1400 audit(1542156642.957:18545): avc: denied { map } for pid=32260 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 893.216257] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 893.294894] XFS (loop4): SB validate failed with error -117. [ 893.411523] audit: type=1400 audit(1542156642.957:18546): avc: denied { map } for pid=32268 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:50:44 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 893.785859] XFS (loop2): device supports 512 byte sectors (not 0) [ 893.847007] audit: type=1400 audit(1542156642.987:18548): avc: denied { map } for pid=32268 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 893.975978] audit: type=1400 audit(1542156642.977:18547): avc: denied { map } for pid=32260 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 894.014214] XFS (loop3): Mounting V4 Filesystem [ 894.052198] 9pnet: p9_errstr2errno: server reported unknown error [ 894.066327] XFS (loop3): totally zeroed log 00:50:45 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 894.163201] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 894.185964] 9pnet: p9_errstr2errno: server reported unknown error 00:50:45 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673ff", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 894.342840] XFS (loop5): Mounting V4 Filesystem 00:50:45 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:50:45 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)="39707f", 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 894.378931] XFS (loop5): totally zeroed log [ 894.433908] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:50:45 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 895.049687] XFS (loop4): SB sanity check failed [ 895.054658] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 895.113017] XFS (loop4): Unmount and run xfs_repair [ 895.145975] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 895.189725] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 895.242845] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 895.270391] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 895.338008] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 895.362372] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 895.406727] XFS (loop1): device supports 512 byte sectors (not 0) [ 895.417915] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 895.450348] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 895.498563] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 895.550788] XFS (loop4): SB validate failed with error -117. 00:50:46 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="78667318", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:50:46 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs(', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 895.897476] XFS (loop3): Mounting V4 Filesystem [ 895.939439] XFS (loop3): totally zeroed log [ 895.986316] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 896.114334] XFS (loop5): Mounting V4 Filesystem [ 896.153958] XFS (loop5): totally zeroed log [ 896.215294] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:50:47 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673ea", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:50:47 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs$', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:50:47 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)="397006", 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:50:47 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667303", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 896.953604] kauditd_printk_skb: 176 callbacks suppressed [ 896.953621] audit: type=1400 audit(1542156647.837:18725): avc: denied { map } for pid=32422 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 897.168743] audit: type=1400 audit(1542156647.877:18726): avc: denied { map } for pid=32422 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 897.271783] audit: type=1400 audit(1542156647.887:18727): avc: denied { map } for pid=32422 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 897.299399] audit: type=1400 audit(1542156647.947:18728): avc: denied { map } for pid=32426 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 897.325800] audit: type=1400 audit(1542156647.947:18729): avc: denied { map } for pid=32426 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 897.351589] audit: type=1400 audit(1542156647.957:18730): avc: denied { map } for pid=32422 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 897.383234] audit: type=1400 audit(1542156647.967:18731): avc: denied { map } for pid=32422 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 897.482426] audit: type=1400 audit(1542156647.987:18732): avc: denied { map } for pid=32426 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 897.511007] audit: type=1400 audit(1542156647.987:18733): avc: denied { map } for pid=32426 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 897.538573] audit: type=1400 audit(1542156648.097:18734): avc: denied { map } for pid=32426 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:50:48 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="78667386", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:50:48 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:50:49 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)="397002", 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:50:49 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667380", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:50:49 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667303", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:50:49 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 899.739337] XFS (loop4): SB sanity check failed [ 899.744628] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 899.870465] XFS (loop4): Unmount and run xfs_repair [ 899.927679] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 899.940344] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 899.988780] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 900.057613] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 900.160126] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ 00:50:51 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 900.256672] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 00:50:51 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 900.309644] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 900.432818] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 900.536631] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 900.600430] XFS (loop4): SB validate failed with error -117. 00:50:51 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:50:51 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 900.983153] XFS (loop2): device supports 512 byte sectors (not 0) 00:50:52 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsP', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:50:52 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 901.644188] XFS (loop3): Mounting V4 Filesystem [ 901.690671] XFS (loop3): totally zeroed log [ 901.713889] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 901.951200] XFS (loop1): device supports 512 byte sectors (not 0) [ 901.980570] kauditd_printk_skb: 233 callbacks suppressed 00:50:52 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673ff", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 901.980586] audit: type=1400 audit(1542156652.867:18968): avc: denied { map } for pid=32525 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 902.162572] audit: type=1400 audit(1542156652.907:18969): avc: denied { map } for pid=32525 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 902.219679] 9pnet: p9_errstr2errno: server reported unknown error 00:50:53 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 902.344941] XFS (loop4): SB sanity check failed [ 902.349819] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 902.406758] audit: type=1400 audit(1542156652.927:18970): avc: denied { map } for pid=32525 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 902.440395] XFS (loop4): Unmount and run xfs_repair [ 902.467502] 9pnet: p9_errstr2errno: server reported unknown error [ 902.480424] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 902.524370] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 00:50:53 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 902.580467] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 902.610842] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 902.649650] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 902.690359] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 902.736017] audit: type=1400 audit(1542156653.617:18971): avc: denied { map } for pid=32554 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 902.758797] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 902.871135] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 902.892813] audit: type=1400 audit(1542156653.627:18972): avc: denied { map } for pid=32554 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 902.935638] XFS (loop2): device supports 512 byte sectors (not 0) [ 902.968628] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 903.029341] XFS (loop4): SB validate failed with error -117. [ 903.064989] audit: type=1400 audit(1542156653.647:18973): avc: denied { map } for pid=32554 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:50:54 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 903.223474] audit: type=1400 audit(1542156653.667:18974): avc: denied { map } for pid=32554 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:50:54 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:50:54 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsh', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 903.576418] audit: type=1400 audit(1542156653.667:18975): avc: denied { map } for pid=32560 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 903.797473] XFS (loop1): device supports 512 byte sectors (not 0) [ 904.027053] audit: audit_backlog=65 > audit_backlog_limit=64 [ 904.050155] audit: audit_backlog=65 > audit_backlog_limit=64 [ 904.184251] 9pnet: p9_errstr2errno: server reported unknown error 00:50:55 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 904.336449] 9pnet: p9_errstr2errno: server reported unknown error 00:50:55 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667303", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:50:55 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)="397016", 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 904.859852] XFS (loop2): device supports 512 byte sectors (not 0) [ 904.913120] XFS (loop4): SB sanity check failed [ 904.918137] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 904.952692] XFS (loop4): Unmount and run xfs_repair [ 904.964848] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 905.015558] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 905.078506] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 905.135624] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 00:50:56 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 905.202954] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 905.290611] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 905.339054] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 905.358479] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ 00:50:56 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 905.561722] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 905.667500] XFS (loop4): SB validate failed with error -117. [ 905.759616] XFS (loop1): device supports 512 byte sectors (not 0) 00:50:56 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667303", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:50:56 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:50:57 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673d4", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:50:57 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 906.741356] XFS (loop2): device supports 512 byte sectors (not 0) [ 906.771683] XFS (loop5): Mounting V4 Filesystem [ 906.792307] XFS (loop5): totally zeroed log [ 906.814501] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 907.002625] kauditd_printk_skb: 181 callbacks suppressed [ 907.002641] audit: type=1400 audit(1542156657.887:19153): avc: denied { map } for pid=32677 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:50:58 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667301", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 907.150928] audit: type=1400 audit(1542156657.887:19154): avc: denied { map } for pid=32677 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:50:58 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 907.323806] audit: type=1400 audit(1542156657.887:19155): avc: denied { map } for pid=32677 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 907.326231] XFS (loop1): device supports 512 byte sectors (not 0) [ 907.471735] audit: type=1400 audit(1542156657.887:19156): avc: denied { map } for pid=32677 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 907.506055] audit: type=1400 audit(1542156657.927:19157): avc: denied { map } for pid=32660 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 907.539216] audit: type=1400 audit(1542156657.977:19158): avc: denied { map } for pid=32677 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 907.575375] audit: type=1400 audit(1542156658.037:19159): avc: denied { map } for pid=32677 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 907.606190] audit: type=1400 audit(1542156658.047:19160): avc: denied { map } for pid=32677 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 907.635159] audit: type=1400 audit(1542156658.107:19161): avc: denied { map } for pid=32677 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 907.701001] audit: type=1400 audit(1542156658.117:19162): avc: denied { map } for pid=32683 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:50:58 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:50:58 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667302", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 908.205631] 9pnet: p9_errstr2errno: server reported unknown error 00:50:59 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:50:59 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 908.995053] XFS (loop2): device supports 512 byte sectors (not 0) 00:51:00 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:51:00 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667303", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 909.465868] XFS (loop1): device supports 512 byte sectors (not 0) [ 909.524639] 9pnet: p9_errstr2errno: server reported unknown error 00:51:00 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:51:00 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 910.169935] XFS (loop3): Mounting V4 Filesystem [ 910.194907] XFS (loop3): totally zeroed log [ 910.222987] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:51:01 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:51:01 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfst', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 910.685455] XFS (loop2): device supports 512 byte sectors (not 0) 00:51:01 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:51:02 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:51:02 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673c4", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 911.793416] XFS (loop1): device supports 512 byte sectors (not 0) [ 911.929950] XFS (loop4): SB sanity check failed [ 911.970297] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 912.014048] kauditd_printk_skb: 195 callbacks suppressed [ 912.014063] audit: type=1400 audit(1542156662.897:19358): avc: denied { map } for pid=343 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:51:02 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 912.097430] XFS (loop4): Unmount and run xfs_repair [ 912.107220] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 912.163042] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 912.185368] audit: type=1400 audit(1542156662.937:19359): avc: denied { map } for pid=343 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 912.259517] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 912.309309] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 912.331901] audit: type=1400 audit(1542156662.937:19360): avc: denied { map } for pid=343 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 912.405893] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 912.470854] audit: type=1400 audit(1542156662.937:19361): avc: denied { map } for pid=330 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 912.504350] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 912.556449] 9pnet: p9_errstr2errno: server reported unknown error [ 912.570696] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 912.592214] audit: type=1400 audit(1542156662.957:19362): avc: denied { map } for pid=330 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 912.625065] audit: type=1400 audit(1542156663.027:19363): avc: denied { map } for pid=330 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 912.658743] audit: type=1400 audit(1542156663.037:19364): avc: denied { map } for pid=343 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 912.671079] XFS (loop2): device supports 512 byte sectors (not 0) [ 912.684369] audit: type=1400 audit(1542156663.097:19365): avc: denied { map } for pid=351 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 912.722569] audit: type=1400 audit(1542156663.107:19366): avc: denied { map } for pid=343 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 912.770878] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ 00:51:03 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 912.866274] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 912.892864] audit: type=1400 audit(1542156663.107:19367): avc: denied { map } for pid=351 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 912.925535] XFS (loop4): SB validate failed with error -117. 00:51:03 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)="397080", 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:51:03 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:51:04 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673ea", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:51:04 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsT', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 913.663958] XFS (loop1): device supports 512 byte sectors (not 0) 00:51:04 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="786673e8", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 914.271347] XFS (loop2): device supports 512 byte sectors (not 0) [ 914.317762] XFS (loop3): Mounting V4 Filesystem [ 914.347477] XFS (loop3): totally zeroed log [ 914.385055] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:51:05 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667303", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:51:05 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:51:05 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:51:06 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsm', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:51:06 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 916.003442] 9pnet: p9_errstr2errno: server reported unknown error [ 916.090493] XFS (loop3): Mounting V4 Filesystem 00:51:07 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 916.189160] XFS (loop3): totally zeroed log [ 916.269615] 9pnet: p9_errstr2errno: server reported unknown error [ 916.276371] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:51:07 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:51:07 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:51:07 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 916.927017] XFS (loop5): Mounting V4 Filesystem [ 916.951425] XFS (loop5): totally zeroed log [ 916.994076] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 917.037572] kauditd_printk_skb: 201 callbacks suppressed [ 917.037589] audit: type=1400 audit(1542156667.917:19569): avc: denied { map } for pid=466 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 917.261663] audit: type=1400 audit(1542156667.957:19570): avc: denied { map } for pid=469 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:51:08 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 917.412110] audit: type=1400 audit(1542156667.967:19571): avc: denied { map } for pid=466 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:51:08 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 917.618004] audit: type=1400 audit(1542156667.977:19572): avc: denied { map } for pid=469 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 917.652831] XFS (loop1): device supports 512 byte sectors (not 0) [ 917.709588] 9pnet: p9_errstr2errno: server reported unknown error [ 917.787084] audit: type=1400 audit(1542156668.077:19573): avc: denied { map } for pid=481 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 917.907333] audit: type=1400 audit(1542156668.097:19574): avc: denied { map } for pid=481 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 917.986556] XFS (loop3): Mounting V4 Filesystem 00:51:08 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 918.014462] XFS (loop3): totally zeroed log [ 918.032783] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 918.094137] audit: type=1400 audit(1542156668.137:19575): avc: denied { map } for pid=481 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:51:09 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:51:09 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 918.430313] audit: type=1400 audit(1542156668.147:19576): avc: denied { map } for pid=481 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 918.599476] audit: type=1400 audit(1542156668.187:19577): avc: denied { map } for pid=484 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 918.662963] XFS (loop2): device supports 512 byte sectors (not 0) [ 918.788034] audit: type=1400 audit(1542156668.207:19578): avc: denied { map } for pid=486 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 919.065547] XFS (loop4): SB sanity check failed [ 919.077585] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 919.095766] XFS (loop4): Unmount and run xfs_repair [ 919.130983] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 919.141210] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 919.145463] XFS (loop5): Mounting V4 Filesystem [ 919.154013] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 919.165796] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 919.177382] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 919.195701] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 919.207418] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 919.218923] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 919.227684] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 919.237178] XFS (loop4): SB validate failed with error -117. [ 919.260421] XFS (loop5): totally zeroed log [ 919.270494] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:51:10 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:51:10 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 919.621636] XFS (loop1): device supports 512 byte sectors (not 0) 00:51:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 919.696096] 9pnet: p9_errstr2errno: server reported unknown error [ 919.777858] XFS (loop3): Mounting V4 Filesystem [ 919.804697] 9pnet: p9_errstr2errno: server reported unknown error [ 919.815165] XFS (loop3): totally zeroed log [ 919.830533] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:51:10 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:51:10 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:51:11 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 920.939209] 9pnet: p9_errstr2errno: server reported unknown error [ 921.035210] XFS (loop2): device supports 512 byte sectors (not 0) [ 921.048264] XFS (loop5): Mounting V4 Filesystem [ 921.079651] XFS (loop5): totally zeroed log [ 921.081655] 9pnet: p9_errstr2errno: server reported unknown error [ 921.118360] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:51:12 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 921.401583] XFS (loop4): SB sanity check failed [ 921.406343] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 921.431257] XFS (loop4): Unmount and run xfs_repair [ 921.439531] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 921.453423] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 921.464900] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 921.476452] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 921.487903] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 921.503042] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 921.514649] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 921.526341] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 921.538184] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 921.552243] XFS (loop1): device supports 512 byte sectors (not 0) [ 921.572731] XFS (loop4): SB validate failed with error -117. 00:51:12 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:51:12 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:51:12 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673ee", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:51:12 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 922.060817] kauditd_printk_skb: 148 callbacks suppressed [ 922.060834] audit: type=1400 audit(1542156672.947:19727): avc: denied { map } for pid=646 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 922.203189] audit: type=1400 audit(1542156672.977:19728): avc: denied { map } for pid=646 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 922.295419] XFS (loop3): Mounting V4 Filesystem [ 922.323991] XFS (loop3): totally zeroed log [ 922.360426] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 922.423940] audit: type=1400 audit(1542156673.017:19729): avc: denied { map } for pid=649 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 922.590283] audit: type=1400 audit(1542156673.017:19730): avc: denied { map } for pid=646 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 922.617708] 9pnet: p9_errstr2errno: server reported unknown error [ 922.785980] 9pnet: p9_errstr2errno: server reported unknown error [ 922.797747] audit: type=1400 audit(1542156673.027:19731): avc: denied { map } for pid=649 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 922.906289] audit: type=1400 audit(1542156673.047:19733): avc: denied { map } for pid=649 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:51:13 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 923.021578] audit: type=1400 audit(1542156673.037:19732): avc: denied { map } for pid=646 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:51:13 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667380", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 923.232661] audit: type=1400 audit(1542156673.077:19734): avc: denied { map } for pid=646 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 923.261593] audit: type=1400 audit(1542156673.127:19735): avc: denied { map } for pid=649 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 923.297708] audit: type=1400 audit(1542156673.147:19736): avc: denied { map } for pid=646 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 923.333673] XFS (loop2): device supports 512 byte sectors (not 0) [ 923.336524] XFS (loop5): Mounting V4 Filesystem [ 923.374930] XFS (loop5): totally zeroed log [ 923.383296] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 923.423286] XFS (loop1): device supports 512 byte sectors (not 0) 00:51:14 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:51:14 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:51:14 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667302", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:51:14 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 924.179390] 9pnet: p9_errstr2errno: server reported unknown error 00:51:15 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)="397001", 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:51:15 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsP', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 925.092594] XFS (loop4): SB sanity check failed [ 925.098863] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 925.202767] XFS (loop4): Unmount and run xfs_repair [ 925.238023] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 925.268110] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 925.321729] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 925.375075] XFS (loop5): Mounting V4 Filesystem [ 925.381438] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 925.428932] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 925.444252] XFS (loop5): totally zeroed log [ 925.474673] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 925.507320] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 925.582814] XFS (loop1): device supports 512 byte sectors (not 0) [ 925.610118] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 925.731306] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ 00:51:16 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsA', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 925.839420] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00:51:16 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\n', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:51:16 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 926.155088] XFS (loop4): SB validate failed with error -117. 00:51:17 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:51:17 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:51:17 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 927.086096] kauditd_printk_skb: 186 callbacks suppressed [ 927.086112] audit: type=1400 audit(1542156677.967:19923): avc: denied { map } for pid=782 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 927.265264] audit: type=1400 audit(1542156678.067:19924): avc: denied { map } for pid=782 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 927.460487] audit: type=1400 audit(1542156678.107:19925): avc: denied { map } for pid=782 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 927.528452] XFS (loop2): device supports 512 byte sectors (not 0) [ 927.676735] audit: type=1400 audit(1542156678.147:19926): avc: denied { map } for pid=782 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 927.881113] audit: type=1400 audit(1542156678.157:19927): avc: denied { map } for pid=782 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:51:18 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 927.936125] 9pnet: p9_errstr2errno: server reported unknown error [ 928.015378] audit: type=1400 audit(1542156678.157:19928): avc: denied { map } for pid=789 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:51:19 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:51:19 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 928.139082] 9pnet: p9_errstr2errno: server reported unknown error [ 928.213149] audit: type=1400 audit(1542156678.177:19929): avc: denied { map } for pid=789 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 928.256893] XFS (loop4): SB sanity check failed [ 928.263585] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 00:51:19 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 928.324918] XFS (loop4): Unmount and run xfs_repair [ 928.375259] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 928.380748] audit: type=1400 audit(1542156678.197:19930): avc: denied { map } for pid=789 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 928.382269] XFS (loop3): Mounting V4 Filesystem [ 928.460285] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 928.468468] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 928.505319] XFS (loop3): totally zeroed log [ 928.527908] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 928.569862] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 928.580669] audit: type=1400 audit(1542156678.217:19931): avc: denied { map } for pid=789 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 928.599205] audit: audit_backlog=65 > audit_backlog_limit=64 [ 928.651374] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 928.707155] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 928.780342] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 928.843101] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ 00:51:19 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673d0", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 928.900058] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 928.964204] XFS (loop4): SB validate failed with error -117. 00:51:19 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 929.368034] XFS (loop2): device supports 512 byte sectors (not 0) [ 929.457487] XFS (loop1): device supports 512 byte sectors (not 0) [ 929.498911] 9pnet: p9_errstr2errno: server reported unknown error [ 929.534684] XFS (loop5): Mounting V4 Filesystem 00:51:20 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 929.582900] XFS (loop5): totally zeroed log [ 929.596910] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 929.667421] 9pnet: p9_errstr2errno: server reported unknown error 00:51:20 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:51:20 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:51:20 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)="397012", 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 930.545221] XFS (loop4): SB sanity check failed [ 930.549968] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 930.654815] XFS (loop4): Unmount and run xfs_repair [ 930.702066] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 930.731110] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 00:51:21 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667303", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 930.819257] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 930.901140] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 930.960155] XFS (loop2): device supports 512 byte sectors (not 0) [ 930.965509] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 931.035012] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 931.114918] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 931.240440] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 931.253630] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 931.265112] XFS (loop4): SB validate failed with error -117. 00:51:22 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 931.500324] XFS (loop1): device supports 512 byte sectors (not 0) [ 931.530022] XFS (loop5): Mounting V4 Filesystem [ 931.552667] XFS (loop5): totally zeroed log [ 931.577263] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:51:22 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:51:22 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:51:22 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 932.097236] kauditd_printk_skb: 194 callbacks suppressed [ 932.097253] audit: type=1400 audit(1542156682.977:20124): avc: denied { map } for pid=942 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 932.290288] audit: type=1400 audit(1542156683.037:20125): avc: denied { map } for pid=942 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:51:23 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\v', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 932.461348] audit: type=1400 audit(1542156683.077:20126): avc: denied { map } for pid=942 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 932.620708] audit: type=1400 audit(1542156683.077:20127): avc: denied { map } for pid=942 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 932.759639] audit: type=1400 audit(1542156683.127:20128): avc: denied { map } for pid=942 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 932.983966] audit: type=1400 audit(1542156683.177:20129): avc: denied { map } for pid=945 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 932.990576] XFS (loop2): device supports 512 byte sectors (not 0) 00:51:24 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 933.065962] XFS (loop4): SB sanity check failed [ 933.071126] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 933.143057] XFS (loop1): device supports 512 byte sectors (not 0) [ 933.172763] XFS (loop4): Unmount and run xfs_repair [ 933.203271] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 933.208111] audit: type=1400 audit(1542156683.177:20130): avc: denied { map } for pid=945 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 933.245010] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 933.294385] XFS (loop5): Mounting V4 Filesystem [ 933.294993] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 933.330522] XFS (loop5): totally zeroed log [ 933.349460] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 933.371378] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 00:51:24 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 933.408309] audit: type=1400 audit(1542156683.207:20131): avc: denied { map } for pid=942 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 933.409473] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ 00:51:24 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 933.520139] audit: type=1400 audit(1542156683.207:20132): avc: denied { map } for pid=945 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 933.546528] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 933.600464] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 933.658816] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 933.690748] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00:51:24 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 933.724376] audit: type=1400 audit(1542156683.217:20133): avc: denied { map } for pid=945 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 933.745991] XFS (loop4): SB validate failed with error -117. 00:51:24 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:51:25 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 934.768047] XFS (loop3): Mounting V4 Filesystem [ 934.799242] XFS (loop3): totally zeroed log [ 934.823694] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 934.857031] XFS (loop1): device supports 512 byte sectors (not 0) 00:51:25 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="78667304", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 934.990613] XFS (loop2): device supports 512 byte sectors (not 0) 00:51:25 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 935.077717] XFS (loop5): Mounting V4 Filesystem [ 935.133980] XFS (loop5): totally zeroed log [ 935.144442] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:51:26 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667380", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 935.299913] XFS (loop4): SB sanity check failed [ 935.304869] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 00:51:26 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 935.390381] XFS (loop4): Unmount and run xfs_repair [ 935.415143] 9pnet: p9_errstr2errno: server reported unknown error [ 935.440367] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 935.460416] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 935.520360] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 935.545170] 9pnet: p9_errstr2errno: server reported unknown error [ 935.580368] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 935.620364] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ 00:51:26 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 935.681250] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 935.723884] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 935.765875] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 935.822664] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 935.895038] XFS (loop4): SB validate failed with error -117. 00:51:27 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 936.596464] XFS (loop3): Mounting V4 Filesystem [ 936.645179] XFS (loop3): totally zeroed log [ 936.739279] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 936.759667] XFS (loop5): Mounting V4 Filesystem [ 936.790845] XFS (loop5): totally zeroed log [ 936.824502] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:51:27 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 937.073334] 9pnet: p9_errstr2errno: server reported unknown error [ 937.109651] kauditd_printk_skb: 182 callbacks suppressed [ 937.109666] audit: type=1400 audit(1542156687.987:20316): avc: denied { map } for pid=1122 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:51:28 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 937.205572] 9pnet: p9_errstr2errno: server reported unknown error [ 937.290375] audit: type=1400 audit(1542156688.057:20317): avc: denied { map } for pid=1122 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:51:28 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:51:28 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:51:28 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 937.494963] audit: type=1400 audit(1542156688.057:20318): avc: denied { map } for pid=1122 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 937.672867] audit: type=1400 audit(1542156688.137:20319): avc: denied { map } for pid=1122 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 937.894682] XFS (loop4): SB sanity check failed [ 937.899561] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 937.945672] audit: type=1400 audit(1542156688.137:20320): avc: denied { map } for pid=1122 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 937.960421] XFS (loop4): Unmount and run xfs_repair [ 938.091465] audit: type=1400 audit(1542156688.207:20321): avc: denied { map } for pid=1134 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 938.100346] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 938.117129] audit: type=1400 audit(1542156688.207:20322): avc: denied { map } for pid=1134 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 938.153500] audit: type=1400 audit(1542156688.227:20323): avc: denied { map } for pid=1132 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 938.202561] audit: type=1400 audit(1542156688.227:20324): avc: denied { map } for pid=1132 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 938.228131] audit: type=1400 audit(1542156688.227:20325): avc: denied { map } for pid=1132 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 938.277700] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 938.364088] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 938.482963] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 938.573264] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 938.601916] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 938.640338] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 938.711621] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 938.717922] 9pnet: p9_errstr2errno: server reported unknown error [ 938.722835] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 938.737559] XFS (loop4): SB validate failed with error -117. [ 938.760713] XFS (loop1): device supports 512 byte sectors (not 0) 00:51:29 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 938.930601] XFS (loop2): device supports 512 byte sectors (not 0) [ 938.985359] XFS (loop5): Mounting V4 Filesystem [ 938.999849] XFS (loop3): Mounting V4 Filesystem 00:51:29 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:51:29 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 939.055560] XFS (loop5): totally zeroed log [ 939.061278] XFS (loop3): totally zeroed log [ 939.131857] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 939.150395] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:51:30 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:51:30 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs{', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:51:30 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 939.954203] XFS (loop4): SB sanity check failed [ 939.959090] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 940.025124] XFS (loop4): Unmount and run xfs_repair [ 940.045440] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 940.049832] 9pnet: p9_errstr2errno: server reported unknown error [ 940.085492] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 940.132630] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 940.185213] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 940.315922] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ 00:51:31 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)="3970ff", 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 940.366569] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 940.390456] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 940.507883] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 940.596452] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 940.607962] XFS (loop1): device supports 512 byte sectors (not 0) [ 940.652012] XFS (loop4): SB validate failed with error -117. [ 940.677278] XFS (loop2): device supports 512 byte sectors (not 0) 00:51:31 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:51:31 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:51:31 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="78667302", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 941.138496] XFS (loop5): Mounting V4 Filesystem [ 941.184927] XFS (loop5): totally zeroed log [ 941.246103] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:51:32 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\n', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:51:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673e8", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:51:33 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 942.130781] kauditd_printk_skb: 161 callbacks suppressed [ 942.130796] audit: type=1400 audit(1542156693.007:20487): avc: denied { map } for pid=1280 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 942.440476] audit: type=1400 audit(1542156693.087:20488): avc: denied { map } for pid=1284 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 942.640286] audit: type=1400 audit(1542156693.137:20489): avc: denied { map } for pid=1284 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 942.754747] XFS (loop2): device supports 512 byte sectors (not 0) [ 942.803921] audit: type=1400 audit(1542156693.167:20490): avc: denied { map } for pid=1285 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 942.984911] audit: type=1400 audit(1542156693.177:20491): avc: denied { map } for pid=1284 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:51:34 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="7866731d", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:51:34 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 943.190270] audit: type=1400 audit(1542156693.187:20492): avc: denied { map } for pid=1280 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 943.327297] XFS (loop4): SB sanity check failed [ 943.332329] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 943.365022] audit: type=1400 audit(1542156693.207:20493): avc: denied { map } for pid=1285 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 943.418061] XFS (loop4): Unmount and run xfs_repair [ 943.461436] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 943.511497] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 943.523882] audit: type=1400 audit(1542156693.207:20494): avc: denied { map } for pid=1284 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 943.574033] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 943.646665] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 943.705556] audit: type=1400 audit(1542156693.217:20495): avc: denied { map } for pid=1280 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 943.765723] audit: audit_backlog=65 > audit_backlog_limit=64 [ 943.801454] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 943.809667] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 943.809680] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 943.809690] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 943.809700] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 943.827204] 9pnet: p9_errstr2errno: server reported unknown error [ 943.927570] XFS (loop4): SB validate failed with error -117. 00:51:34 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 944.009961] 9pnet: p9_errstr2errno: server reported unknown error 00:51:34 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:51:35 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:51:35 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 944.793382] XFS (loop2): device supports 512 byte sectors (not 0) [ 945.115630] XFS (loop4): SB sanity check failed [ 945.121688] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 945.246317] XFS (loop4): Unmount and run xfs_repair 00:51:36 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 945.270390] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 945.294894] 9pnet: p9_errstr2errno: server reported unknown error [ 945.312147] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 945.335264] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 945.375089] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 00:51:36 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 945.376306] XFS (loop5): Mounting V4 Filesystem [ 945.430402] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 945.430857] XFS (loop5): totally zeroed log [ 945.477330] XFS (loop3): Mounting V4 Filesystem [ 945.496222] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 945.508857] 9pnet: p9_errstr2errno: server reported unknown error [ 945.528555] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 945.541196] XFS (loop3): totally zeroed log [ 945.556409] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 945.592378] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 00:51:36 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)="397003", 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 945.698582] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 945.850361] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00:51:36 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="7866730e", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 945.904875] XFS (loop4): SB validate failed with error -117. 00:51:36 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:51:37 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673c4", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 946.641926] XFS (loop1): device supports 512 byte sectors (not 0) [ 946.695059] XFS (loop2): device supports 512 byte sectors (not 0) 00:51:37 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:51:37 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673f5", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 947.153602] kauditd_printk_skb: 198 callbacks suppressed [ 947.153618] audit: type=1400 audit(1542156698.037:20689): avc: denied { map } for pid=1423 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 947.210740] audit: type=1400 audit(1542156698.057:20690): avc: denied { map } for pid=1431 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 947.350566] audit: type=1400 audit(1542156698.127:20691): avc: denied { map } for pid=1431 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 947.376738] audit: type=1400 audit(1542156698.147:20692): avc: denied { map } for pid=1431 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 947.404331] audit: type=1400 audit(1542156698.147:20693): avc: denied { map } for pid=1427 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 947.430105] audit: type=1400 audit(1542156698.177:20694): avc: denied { map } for pid=1431 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 947.465716] audit: type=1400 audit(1542156698.257:20695): avc: denied { map } for pid=1427 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 947.496771] audit: type=1400 audit(1542156698.307:20696): avc: denied { map } for pid=1427 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 947.532646] audit: type=1400 audit(1542156698.347:20697): avc: denied { map } for pid=1431 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 947.608205] audit: type=1400 audit(1542156698.417:20698): avc: denied { map } for pid=1427 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 947.718756] XFS (loop3): Mounting V4 Filesystem [ 947.763443] XFS (loop3): totally zeroed log 00:51:38 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 947.789818] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:51:38 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:51:39 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs?', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:51:39 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 948.722204] XFS (loop1): device supports 512 byte sectors (not 0) 00:51:39 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:51:40 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:51:40 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\t', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 949.689492] XFS (loop4): SB sanity check failed [ 949.704843] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 949.729019] XFS (loop5): Mounting V4 Filesystem [ 949.791034] XFS (loop4): Unmount and run xfs_repair [ 949.794761] XFS (loop5): totally zeroed log [ 949.825712] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 949.834145] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 949.876025] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 949.967341] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 950.047705] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 00:51:41 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 950.105997] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 950.167866] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 00:51:41 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 950.262995] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 950.322513] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 950.369090] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 950.412093] XFS (loop4): SB validate failed with error -117. [ 950.434481] XFS (loop1): device supports 512 byte sectors (not 0) [ 950.471651] 9pnet: p9_errstr2errno: server reported unknown error 00:51:41 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 950.564230] 9pnet: p9_errstr2errno: server reported unknown error 00:51:41 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:51:41 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="786673e0", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 951.459571] XFS (loop5): Mounting V4 Filesystem [ 951.487304] XFS (loop5): totally zeroed log [ 951.516053] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 951.607416] XFS (loop3): Mounting V4 Filesystem [ 951.626327] XFS (loop3): totally zeroed log [ 951.639453] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:51:42 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 951.786262] 9pnet: p9_errstr2errno: server reported unknown error 00:51:42 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:51:42 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667301", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 951.968993] 9pnet: p9_errstr2errno: server reported unknown error [ 951.996066] XFS (loop4): SB sanity check failed [ 952.001357] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 00:51:42 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 952.076866] XFS (loop4): Unmount and run xfs_repair [ 952.125859] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 952.162081] kauditd_printk_skb: 190 callbacks suppressed [ 952.162096] audit: type=1400 audit(1542156703.047:20889): avc: denied { map } for pid=1585 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 952.169506] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 952.315494] audit: type=1400 audit(1542156703.087:20890): avc: denied { map } for pid=1600 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 952.410335] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 952.445620] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 952.513453] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 952.519013] audit: type=1400 audit(1542156703.097:20891): avc: denied { map } for pid=1599 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 952.582970] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 952.635882] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 952.697016] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ 00:51:43 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)="786673f4", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 952.742684] audit: type=1400 audit(1542156703.107:20892): avc: denied { map } for pid=1600 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 952.751256] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 952.863114] audit: type=1400 audit(1542156703.117:20893): avc: denied { map } for pid=1585 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 952.938375] XFS (loop4): SB validate failed with error -117. [ 953.027473] XFS (loop2): device supports 512 byte sectors (not 0) [ 953.033920] audit: type=1400 audit(1542156703.117:20894): avc: denied { map } for pid=1585 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:51:44 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 953.215172] XFS (loop5): Mounting V4 Filesystem [ 953.240615] audit: type=1400 audit(1542156703.127:20895): avc: denied { map } for pid=1600 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:51:44 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 953.293503] XFS (loop5): totally zeroed log [ 953.303750] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 953.400479] audit: type=1400 audit(1542156703.147:20896): avc: denied { map } for pid=1599 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 953.432988] audit: type=1400 audit(1542156703.147:20897): avc: denied { map } for pid=1600 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 953.455214] 9pnet: p9_errstr2errno: server reported unknown error [ 953.463655] audit: type=1400 audit(1542156703.167:20898): avc: denied { map } for pid=1599 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:51:44 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:51:44 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:51:45 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 954.429419] XFS (loop4): SB sanity check failed [ 954.434480] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 954.540557] XFS (loop4): Unmount and run xfs_repair [ 954.580456] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 954.628908] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 954.670318] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 954.750332] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 954.800423] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 954.830688] XFS (loop2): device supports 512 byte sectors (not 0) [ 954.854221] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 00:51:45 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 954.920301] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 954.931806] 9pnet: p9_errstr2errno: server reported unknown error [ 955.011075] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 955.050111] XFS (loop5): Mounting V4 Filesystem [ 955.074031] XFS (loop5): totally zeroed log [ 955.107460] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 955.110954] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00:51:46 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:51:46 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 955.179894] XFS (loop4): SB validate failed with error -117. 00:51:46 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 955.480508] XFS (loop3): Mounting V4 Filesystem [ 955.537333] XFS (loop3): totally zeroed log 00:51:46 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsF', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 955.585601] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:51:47 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 956.516012] 9pnet: p9_errstr2errno: server reported unknown error [ 956.701375] XFS (loop1): device supports 512 byte sectors (not 0) [ 956.776067] XFS (loop2): device supports 512 byte sectors (not 0) 00:51:47 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)="3970c0", 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 956.904884] XFS (loop4): SB sanity check failed [ 956.920092] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 00:51:47 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 956.970300] XFS (loop4): Unmount and run xfs_repair [ 956.983341] XFS (loop4): First 128 bytes of corrupted metadata buffer: 00:51:47 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="7866731e", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 957.056635] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 957.170487] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 957.192591] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 957.205213] kauditd_printk_skb: 192 callbacks suppressed [ 957.205228] audit: type=1400 audit(1542156708.087:21091): avc: denied { map } for pid=1722 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 957.305316] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 957.337380] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 957.452973] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ 00:51:48 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 957.524446] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 957.618827] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 957.691278] audit: type=1400 audit(1542156708.577:21092): avc: denied { map } for pid=1757 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 957.702229] XFS (loop4): SB validate failed with error -117. [ 957.856030] audit: type=1400 audit(1542156708.617:21093): avc: denied { map } for pid=1757 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 957.896253] XFS (loop3): Mounting V4 Filesystem 00:51:48 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 957.941225] XFS (loop3): totally zeroed log [ 957.955369] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 958.041348] audit: type=1400 audit(1542156708.617:21094): avc: denied { map } for pid=1757 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 958.244888] audit: type=1400 audit(1542156708.617:21095): avc: denied { map } for pid=1757 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 958.349050] XFS (loop1): device supports 512 byte sectors (not 0) 00:51:49 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 958.442720] audit: type=1400 audit(1542156708.687:21096): avc: denied { map } for pid=1757 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 958.530574] audit: audit_backlog=65 > audit_backlog_limit=64 [ 958.533534] audit: audit_backlog=65 > audit_backlog_limit=64 00:51:49 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 958.580704] audit: audit_backlog=65 > audit_backlog_limit=64 [ 958.590011] audit: audit_lost=129 audit_rate_limit=0 audit_backlog_limit=64 00:51:49 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:51:50 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667384", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 959.468919] XFS (loop5): Mounting V4 Filesystem [ 959.489053] XFS (loop5): totally zeroed log [ 959.511399] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 959.692717] XFS (loop4): Invalid superblock magic number 00:51:50 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs$', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 960.015151] 9pnet: p9_errstr2errno: server reported unknown error 00:51:51 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x13, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 960.145511] XFS (loop3): Mounting V4 Filesystem [ 960.200739] XFS (loop3): totally zeroed log [ 960.214608] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:51:51 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 960.305405] XFS (loop1): device supports 512 byte sectors (not 0) 00:51:51 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsp', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:51:51 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffff2a, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:51:52 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 961.570701] 9pnet: p9_errstr2errno: server reported unknown error 00:51:52 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p`', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:51:52 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\t', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 961.998608] XFS (loop4): Invalid superblock magic number [ 962.144485] XFS (loop1): device supports 512 byte sectors (not 0) 00:51:53 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfeffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 962.211550] kauditd_printk_skb: 230 callbacks suppressed [ 962.211567] audit: type=1400 audit(1542156713.097:21319): avc: denied { map } for pid=1882 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:51:53 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffff2d, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 962.470289] audit: type=1400 audit(1542156713.097:21320): avc: denied { map } for pid=1882 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 962.637201] audit: type=1400 audit(1542156713.097:21321): avc: denied { map } for pid=1889 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:51:53 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667304", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 962.823644] audit: type=1400 audit(1542156713.127:21322): avc: denied { map } for pid=1896 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 962.923295] XFS (loop2): device supports 512 byte sectors (not 0) [ 962.991843] audit: type=1400 audit(1542156713.187:21323): avc: denied { map } for pid=1882 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 963.169787] audit: type=1400 audit(1542156713.197:21324): avc: denied { map } for pid=1889 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:51:54 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 963.385676] audit: type=1400 audit(1542156713.217:21325): avc: denied { map } for pid=1889 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 963.496814] XFS (loop1): device supports 512 byte sectors (not 0) [ 963.554935] audit: type=1400 audit(1542156713.217:21326): avc: denied { map } for pid=1882 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 963.614501] XFS (loop4): SB sanity check failed [ 963.625703] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 963.709337] XFS (loop4): Unmount and run xfs_repair 00:51:54 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:51:54 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffff8500, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 963.753481] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 963.785805] audit: type=1400 audit(1542156713.227:21327): avc: denied { map } for pid=1896 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 963.836995] audit: audit_backlog=65 > audit_backlog_limit=64 [ 963.860670] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 963.900567] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 963.975922] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 964.040718] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 964.052131] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 964.063731] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 964.075500] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 964.086995] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 964.109458] XFS (loop4): SB validate failed with error -117. 00:51:55 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:51:55 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5000000, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:51:55 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 964.967650] XFS (loop2): device supports 512 byte sectors (not 0) 00:51:56 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 965.238589] 9pnet: p9_errstr2errno: server reported unknown error [ 965.374196] 9pnet: p9_errstr2errno: server reported unknown error [ 965.398718] XFS (loop1): device supports 512 byte sectors (not 0) 00:51:56 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 965.637450] XFS (loop5): Mounting V4 Filesystem 00:51:56 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x8b80, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 965.712122] XFS (loop5): totally zeroed log [ 965.726754] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 965.802369] XFS (loop4): SB sanity check failed [ 965.807223] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 965.880317] XFS (loop4): Unmount and run xfs_repair [ 965.907759] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 965.977630] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 00:51:56 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 966.055125] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 966.130322] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 966.190300] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 966.246810] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 966.355019] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 966.410654] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 966.482300] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 966.493970] XFS (loop4): SB validate failed with error -117. [ 966.527206] XFS (loop3): Mounting V4 Filesystem [ 966.584494] XFS (loop3): totally zeroed log [ 966.598909] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 966.676264] XFS (loop2): device supports 512 byte sectors (not 0) 00:51:57 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xd000000, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:51:57 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 967.123371] XFS (loop1): device supports 512 byte sectors (not 0) [ 967.152710] 9pnet: p9_errstr2errno: server reported unknown error 00:51:58 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:51:58 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 967.457857] kauditd_printk_skb: 194 callbacks suppressed [ 967.457872] audit: type=1400 audit(1542156718.337:21499): avc: denied { map } for pid=2054 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:51:58 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x8a00, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 967.625649] audit: type=1400 audit(1542156718.377:21500): avc: denied { map } for pid=2054 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 967.747662] XFS (loop5): Mounting V4 Filesystem [ 967.770295] audit: type=1400 audit(1542156718.397:21501): avc: denied { map } for pid=2054 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 967.797819] XFS (loop5): totally zeroed log [ 967.824406] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 967.948476] audit: type=1400 audit(1542156718.407:21502): avc: denied { map } for pid=2054 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 968.089379] audit: type=1400 audit(1542156718.487:21503): avc: denied { map } for pid=2054 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:51:59 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 968.188712] XFS (loop4): SB sanity check failed [ 968.198474] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 968.266120] audit: type=1400 audit(1542156718.537:21504): avc: denied { map } for pid=2054 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 968.294328] XFS (loop4): Unmount and run xfs_repair [ 968.322920] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 968.358587] XFS (loop3): Mounting V4 Filesystem [ 968.384689] XFS (loop3): totally zeroed log [ 968.400368] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 968.430728] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 968.451084] audit: type=1400 audit(1542156718.577:21505): avc: denied { map } for pid=2054 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 968.453268] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 968.520407] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 968.551808] audit: type=1400 audit(1542156718.587:21506): avc: denied { map } for pid=2054 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 968.640512] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 968.664058] 9pnet: p9_errstr2errno: server reported unknown error [ 968.745028] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 968.771549] audit: type=1400 audit(1542156718.637:21507): avc: denied { map } for pid=2060 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 968.850390] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 968.858862] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 968.896703] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00:51:59 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsx', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 969.012774] XFS (loop2): device supports 512 byte sectors (not 0) [ 969.033398] audit: type=1400 audit(1542156718.637:21508): avc: denied { map } for pid=2060 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 969.060471] XFS (loop4): SB validate failed with error -117. 00:52:00 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:52:00 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 969.351189] XFS (loop1): device supports 512 byte sectors (not 0) 00:52:00 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667304", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:52:00 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2c, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 969.816357] XFS (loop5): Mounting V4 Filesystem [ 969.869664] XFS (loop5): totally zeroed log [ 969.898622] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 970.139600] 9pnet: p9_errstr2errno: server reported unknown error 00:52:01 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs"', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 970.232832] 9pnet: p9_errstr2errno: server reported unknown error 00:52:01 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 970.598029] XFS (loop4): SB sanity check failed [ 970.602981] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 970.693237] XFS (loop4): Unmount and run xfs_repair [ 970.757062] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 970.819102] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 970.890802] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 970.968304] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 970.989061] XFS (loop1): Invalid superblock magic number 00:52:01 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsl', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 971.117677] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 971.232176] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 00:52:02 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x79, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 971.332731] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 971.360788] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 971.482350] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 971.510367] XFS (loop4): SB validate failed with error -117. 00:52:02 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:52:02 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x11000000, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 971.806578] 9pnet: p9_errstr2errno: server reported unknown error 00:52:03 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673ff", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:52:03 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 972.601879] kauditd_printk_skb: 188 callbacks suppressed [ 972.601894] audit: type=1400 audit(1542156723.487:21697): avc: denied { map } for pid=2202 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 972.669566] XFS (loop1): Invalid superblock magic number [ 972.835517] audit: type=1400 audit(1542156723.527:21698): avc: denied { map } for pid=2202 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 972.985144] audit: type=1400 audit(1542156723.537:21699): avc: denied { map } for pid=2203 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:03 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:52:04 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffff002f, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 973.170344] audit: type=1400 audit(1542156723.557:21700): avc: denied { map } for pid=2202 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 973.253562] XFS (loop2): device supports 512 byte sectors (not 0) [ 973.298163] XFS (loop4): SB sanity check failed [ 973.306309] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 973.371613] audit: type=1400 audit(1542156723.557:21701): avc: denied { map } for pid=2202 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 973.399067] 9pnet: p9_errstr2errno: server reported unknown error [ 973.446238] XFS (loop4): Unmount and run xfs_repair [ 973.497427] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 973.529809] 9pnet: p9_errstr2errno: server reported unknown error 00:52:04 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs"', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 973.554088] audit: type=1400 audit(1542156723.597:21702): avc: denied { map } for pid=2203 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 973.588714] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 973.669893] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00:52:04 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 973.786674] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 973.824193] audit: type=1400 audit(1542156723.597:21703): avc: denied { map } for pid=2203 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 973.927797] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 973.983715] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 974.062043] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 974.133226] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 974.180331] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00:52:05 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 974.248205] XFS (loop4): SB validate failed with error -117. [ 974.262484] audit: type=1400 audit(1542156723.637:21704): avc: denied { map } for pid=2202 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:05 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffff0010, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 974.412474] audit: type=1400 audit(1542156723.647:21705): avc: denied { map } for pid=2203 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 974.507254] XFS (loop3): Mounting V4 Filesystem [ 974.574433] audit: audit_backlog=65 > audit_backlog_limit=64 [ 974.580526] XFS (loop3): totally zeroed log [ 974.604150] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 974.746276] XFS (loop1): device supports 512 byte sectors (not 0) 00:52:05 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 975.012022] 9pnet: p9_errstr2errno: server reported unknown error 00:52:06 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffff0440, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:52:06 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:52:06 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 976.166784] XFS (loop4): SB sanity check failed 00:52:07 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 976.191296] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 976.300585] XFS (loop4): Unmount and run xfs_repair [ 976.305657] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 976.315755] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 976.327274] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 976.339018] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 976.350924] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 976.362616] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 976.374028] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 976.384325] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 976.395735] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 976.407547] XFS (loop4): SB validate failed with error -117. 00:52:07 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 976.781339] 9pnet: p9_errstr2errno: server reported unknown error [ 976.878099] XFS (loop3): Mounting V4 Filesystem [ 976.907744] XFS (loop3): totally zeroed log [ 976.947332] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:52:07 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:52:08 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 977.281140] XFS (loop2): device supports 512 byte sectors (not 0) [ 977.290482] XFS (loop1): device supports 512 byte sectors (not 0) 00:52:08 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffff0003, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:52:08 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 977.613917] kauditd_printk_skb: 163 callbacks suppressed [ 977.613934] audit: type=1400 audit(1542156728.497:21867): avc: denied { map } for pid=2348 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 977.740104] XFS (loop5): Mounting V4 Filesystem [ 977.800405] XFS (loop5): totally zeroed log [ 977.807460] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 977.874254] audit: type=1400 audit(1542156728.497:21868): avc: denied { map } for pid=2345 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 977.960498] 9pnet: p9_errstr2errno: server reported unknown error [ 978.037133] XFS (loop4): Invalid superblock magic number [ 978.042670] audit: type=1400 audit(1542156728.497:21869): avc: denied { map } for pid=2348 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 978.042702] audit: type=1400 audit(1542156728.527:21870): avc: denied { map } for pid=2345 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 978.042731] audit: type=1400 audit(1542156728.587:21871): avc: denied { map } for pid=2348 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 978.042759] audit: type=1400 audit(1542156728.607:21872): avc: denied { map } for pid=2348 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:09 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:52:09 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xa, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:52:09 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 978.736922] XFS (loop3): Mounting V4 Filesystem [ 978.772260] XFS (loop3): totally zeroed log [ 978.796590] audit: type=1400 audit(1542156728.727:21873): avc: denied { map } for pid=2348 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 978.841420] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 978.947630] audit: type=1400 audit(1542156728.727:21874): avc: denied { map } for pid=2348 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 979.040275] XFS (loop1): device supports 512 byte sectors (not 0) [ 979.101575] audit: type=1400 audit(1542156729.067:21875): avc: denied { map } for pid=2377 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 979.202291] XFS (loop2): device supports 512 byte sectors (not 0) [ 979.267820] audit: type=1400 audit(1542156729.067:21876): avc: denied { map } for pid=2377 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:10 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667387", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:52:10 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x11, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 979.622270] XFS (loop4): Invalid superblock magic number 00:52:10 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 979.732007] XFS (loop5): Mounting V4 Filesystem [ 979.809964] XFS (loop5): totally zeroed log [ 979.833855] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:52:10 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x11, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 980.070356] 9pnet: p9_errstr2errno: server reported unknown error 00:52:11 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 980.157999] 9pnet: p9_errstr2errno: server reported unknown error 00:52:11 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 980.759438] XFS (loop1): Invalid superblock magic number [ 980.888202] XFS (loop2): device supports 512 byte sectors (not 0) 00:52:11 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffff03, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:52:12 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsz', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 981.280113] 9pnet: p9_errstr2errno: server reported unknown error 00:52:12 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 981.441838] 9pnet: p9_errstr2errno: server reported unknown error [ 981.450672] XFS (loop4): Invalid superblock magic number 00:52:12 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 981.809304] XFS (loop5): Mounting V4 Filesystem 00:52:12 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1e, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 981.908891] XFS (loop5): totally zeroed log [ 981.920085] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:52:13 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 982.449071] XFS (loop1): device supports 512 byte sectors (not 0) [ 982.647726] kauditd_printk_skb: 184 callbacks suppressed [ 982.647742] audit: type=1400 audit(1542156733.527:22061): avc: denied { map } for pid=2533 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:13 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffff0980, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 982.835135] audit: type=1400 audit(1542156733.527:22062): avc: denied { map } for pid=2533 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 983.000310] 9pnet: p9_errstr2errno: server reported unknown error [ 983.030488] audit: type=1400 audit(1542156733.567:22063): avc: denied { map } for pid=2534 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 983.061994] audit: type=1400 audit(1542156733.577:22064): avc: denied { map } for pid=2533 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 983.089738] audit: type=1400 audit(1542156733.587:22065): avc: denied { map } for pid=2533 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 983.118476] audit: type=1400 audit(1542156733.587:22066): avc: denied { map } for pid=2534 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:14 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p,', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 983.346353] audit: type=1400 audit(1542156733.647:22067): avc: denied { map } for pid=2546 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 983.457179] XFS (loop3): Mounting V4 Filesystem [ 983.494348] XFS (loop3): totally zeroed log [ 983.520823] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 983.530344] audit: type=1400 audit(1542156733.657:22068): avc: denied { map } for pid=2546 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:14 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 983.631823] XFS (loop4): Invalid superblock magic number [ 983.696831] XFS (loop5): Mounting V4 Filesystem [ 983.721880] audit: type=1400 audit(1542156733.687:22069): avc: denied { map } for pid=2546 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 983.770375] XFS (loop5): totally zeroed log [ 983.807065] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 983.897483] audit: type=1400 audit(1542156733.717:22070): avc: denied { map } for pid=2546 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:15 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x10, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:52:15 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:52:15 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 984.217556] XFS (loop1): device supports 512 byte sectors (not 0) 00:52:15 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffff2f, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:52:16 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p"', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 985.717360] XFS (loop3): Mounting V4 Filesystem [ 985.753799] XFS (loop3): totally zeroed log [ 985.778928] XFS (loop2): device supports 512 byte sectors (not 0) [ 985.788065] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 985.897203] XFS (loop5): Mounting V4 Filesystem [ 985.937992] XFS (loop5): totally zeroed log 00:52:16 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 985.963330] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 986.016101] XFS (loop4): Invalid superblock magic number [ 986.075975] XFS (loop1): device supports 512 byte sectors (not 0) 00:52:17 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:52:17 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:52:17 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:52:17 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffff007c, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:52:18 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)="397001", 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 987.510875] XFS (loop4): SB sanity check failed [ 987.528413] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 987.616102] XFS (loop2): device supports 512 byte sectors (not 0) [ 987.666489] XFS (loop4): Unmount and run xfs_repair [ 987.726877] kauditd_printk_skb: 180 callbacks suppressed [ 987.726894] audit: type=1400 audit(1542156738.607:22251): avc: denied { map } for pid=2701 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 987.727370] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 987.828016] audit: type=1400 audit(1542156738.707:22252): avc: denied { map } for pid=2720 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 987.890889] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 987.962521] audit: type=1400 audit(1542156738.747:22253): avc: denied { map } for pid=2720 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 987.990154] audit: type=1400 audit(1542156738.757:22254): avc: denied { map } for pid=2701 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 987.994704] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 988.017812] audit: type=1400 audit(1542156738.757:22255): avc: denied { map } for pid=2720 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 988.025678] XFS (loop1): device supports 512 byte sectors (not 0) 00:52:18 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 988.150717] XFS (loop3): Mounting V4 Filesystem [ 988.199544] XFS (loop3): totally zeroed log [ 988.227932] XFS (loop5): Mounting V4 Filesystem [ 988.237727] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 988.245138] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 988.268528] XFS (loop5): totally zeroed log [ 988.302845] audit: type=1400 audit(1542156738.767:22256): avc: denied { map } for pid=2720 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 988.330341] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 988.334673] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ 00:52:19 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffff7c, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 988.431290] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 988.500353] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 988.560729] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 988.588852] audit: type=1400 audit(1542156738.947:22257): avc: denied { map } for pid=2720 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 988.641420] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 988.653927] XFS (loop4): SB validate failed with error -117. 00:52:19 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 988.685921] audit: type=1400 audit(1542156738.987:22258): avc: denied { map } for pid=2720 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 988.714881] audit: type=1400 audit(1542156738.997:22259): avc: denied { map } for pid=2720 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 988.743810] audit: type=1400 audit(1542156739.057:22260): avc: denied { map } for pid=2724 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:19 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:52:19 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x13000000, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 989.647511] XFS (loop2): device supports 512 byte sectors (not 0) 00:52:20 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 989.739661] XFS (loop1): device supports 512 byte sectors (not 0) 00:52:20 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:52:20 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffff6e, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 990.106384] XFS (loop3): Mounting V4 Filesystem [ 990.123685] XFS (loop5): Mounting V4 Filesystem [ 990.159966] XFS (loop5): totally zeroed log [ 990.170801] XFS (loop3): totally zeroed log [ 990.177600] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 990.205966] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 990.284277] XFS (loop4): SB sanity check failed [ 990.289012] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 990.369462] XFS (loop4): Unmount and run xfs_repair [ 990.419387] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 990.472429] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 00:52:21 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\\', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:52:21 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsr', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 990.537691] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 990.642617] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 990.682401] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 990.693921] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 990.740273] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 990.752133] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 990.763572] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 990.781916] XFS (loop4): SB validate failed with error -117. 00:52:21 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2000000, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 991.179223] 9pnet: p9_errstr2errno: server reported unknown error [ 991.302931] XFS (loop1): device supports 512 byte sectors (not 0) [ 991.316903] 9pnet: p9_errstr2errno: server reported unknown error [ 991.362927] XFS (loop2): device supports 512 byte sectors (not 0) 00:52:22 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:52:22 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x74, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:52:22 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 992.573772] XFS (loop4): SB sanity check failed [ 992.581068] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 992.641283] XFS (loop4): Unmount and run xfs_repair [ 992.646529] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 992.699249] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 00:52:23 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673c0", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 992.750414] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 992.758776] kauditd_printk_skb: 181 callbacks suppressed [ 992.758791] audit: type=1400 audit(1542156743.637:22442): avc: denied { map } for pid=2871 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 992.768166] 9pnet: p9_errstr2errno: server reported unknown error 00:52:23 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667318", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 992.813934] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 992.866693] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 992.934524] audit: type=1400 audit(1542156743.647:22443): avc: denied { map } for pid=2871 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 992.952783] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 993.197769] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 993.206204] XFS (loop1): Invalid superblock magic number [ 993.275656] audit: type=1400 audit(1542156743.677:22444): avc: denied { map } for pid=2865 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 993.300473] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 993.312042] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 993.324272] XFS (loop4): SB validate failed with error -117. [ 993.355624] XFS (loop2): device supports 512 byte sectors (not 0) [ 993.363423] audit: type=1400 audit(1542156743.677:22445): avc: denied { map } for pid=2865 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:24 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 993.392244] audit: type=1400 audit(1542156743.727:22446): avc: denied { map } for pid=2871 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 993.458805] audit: type=1400 audit(1542156743.747:22448): avc: denied { map } for pid=2871 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 993.482992] audit: type=1400 audit(1542156743.747:22447): avc: denied { map } for pid=2865 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 993.535688] audit: type=1400 audit(1542156743.787:22449): avc: denied { map } for pid=2865 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:24 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xe000000, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:52:24 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffff0cc0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 993.750295] audit: type=1400 audit(1542156743.797:22450): avc: denied { map } for pid=2871 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 993.897638] audit: type=1400 audit(1542156743.807:22451): avc: denied { map } for pid=2871 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:24 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 994.777878] 9pnet: p9_errstr2errno: server reported unknown error 00:52:25 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfsX', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 994.885383] XFS (loop1): device supports 512 byte sectors (not 0) 00:52:26 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:52:26 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:52:26 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffff0280, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 995.395174] XFS (loop4): SB sanity check failed [ 995.400088] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 995.460420] XFS (loop4): Unmount and run xfs_repair [ 995.465632] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 995.524108] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 995.577520] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 995.620838] XFS (loop2): device supports 512 byte sectors (not 0) [ 995.635289] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 995.716244] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 995.805976] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 995.855407] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 995.908356] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 995.956485] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 996.008726] XFS (loop4): SB validate failed with error -117. 00:52:27 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667380", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 996.109904] 9pnet: p9_errstr2errno: server reported unknown error 00:52:27 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffff6e, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 996.278153] XFS (loop1): device supports 512 byte sectors (not 0) [ 996.309612] 9pnet: p9_errstr2errno: server reported unknown error 00:52:27 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)="3970ff", 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 996.629744] XFS (loop5): Mounting V4 Filesystem [ 996.702448] XFS (loop5): totally zeroed log 00:52:27 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffff2c, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 996.734680] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:52:27 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x13, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:52:28 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 997.767920] XFS (loop4): SB sanity check failed [ 997.773043] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 997.797497] kauditd_printk_skb: 149 callbacks suppressed [ 997.797512] audit: type=1400 audit(1542156748.677:22601): avc: denied { map } for pid=3020 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 997.875973] XFS (loop4): Unmount and run xfs_repair [ 997.919279] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 997.980398] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 998.003080] audit: type=1400 audit(1542156748.717:22602): avc: denied { map } for pid=3020 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 998.063570] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 998.138167] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 998.205432] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 998.229011] XFS (loop3): Invalid superblock magic number [ 998.245573] audit: type=1400 audit(1542156748.717:22603): avc: denied { map } for pid=3020 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 998.329642] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 998.344182] XFS (loop1): device supports 512 byte sectors (not 0) 00:52:29 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673c4", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 998.488193] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 998.502197] audit: type=1400 audit(1542156748.717:22604): avc: denied { map } for pid=3010 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 998.529491] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ 00:52:29 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)="397005", 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 998.577804] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 998.650382] XFS (loop4): SB validate failed with error -117. 00:52:29 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 998.760971] audit: type=1400 audit(1542156748.717:22605): avc: denied { map } for pid=3010 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:29 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x500, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 998.934648] audit: type=1400 audit(1542156748.727:22606): avc: denied { map } for pid=3022 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:29 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 999.174177] XFS (loop5): Mounting V4 Filesystem [ 999.264987] audit: type=1400 audit(1542156748.727:22607): avc: denied { map } for pid=3022 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 999.306440] XFS (loop5): totally zeroed log [ 999.313551] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 999.476103] audit: type=1400 audit(1542156748.747:22608): avc: denied { map } for pid=3016 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 999.620337] audit: type=1400 audit(1542156748.787:22609): avc: denied { map } for pid=3022 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:30 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667303", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 999.761251] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1000.380948] XFS (loop4): Invalid superblock magic number [ 1000.529708] XFS (loop1): device supports 512 byte sectors (not 0) [ 1000.573897] XFS (loop3): Invalid superblock magic number 00:52:31 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:52:31 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:52:31 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:52:31 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffff63, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:52:32 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5000000, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:52:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 1002.021687] 9pnet: p9_errstr2errno: server reported unknown error [ 1002.057323] XFS (loop4): Invalid superblock magic number [ 1002.066966] XFS (loop2): device supports 512 byte sectors (not 0) [ 1002.131598] XFS (loop1): device supports 512 byte sectors (not 0) 00:52:33 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:52:33 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:52:33 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xe, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 1002.632857] XFS (loop3): Mounting V4 Filesystem [ 1002.661925] XFS (loop3): totally zeroed log [ 1002.684849] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 1002.811686] kauditd_printk_skb: 202 callbacks suppressed [ 1002.811701] audit: type=1400 audit(1542156753.697:22810): avc: denied { map } for pid=3221 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:33 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xa000, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:52:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2000000, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 1002.982537] audit: type=1400 audit(1542156753.747:22811): avc: denied { map } for pid=3221 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1003.160355] audit: type=1400 audit(1542156753.747:22812): avc: denied { map } for pid=3221 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1003.353779] audit: type=1400 audit(1542156753.747:22813): avc: denied { map } for pid=3221 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1003.521377] audit: type=1400 audit(1542156753.817:22814): avc: denied { map } for pid=3221 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1003.564369] audit: type=1400 audit(1542156753.887:22815): avc: denied { map } for pid=3221 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1003.565516] XFS (loop5): Mounting V4 Filesystem [ 1003.592257] audit: type=1400 audit(1542156753.927:22816): avc: denied { map } for pid=3228 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1003.619129] audit: type=1400 audit(1542156753.927:22817): avc: denied { map } for pid=3228 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1003.644571] audit: type=1400 audit(1542156753.937:22818): avc: denied { map } for pid=3221 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1003.676194] audit: type=1400 audit(1542156753.957:22819): avc: denied { map } for pid=3228 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1003.740912] XFS (loop5): totally zeroed log [ 1003.757739] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 1003.950982] 9pnet: p9_errstr2errno: server reported unknown error [ 1003.998910] XFS (loop4): Invalid superblock magic number 00:52:34 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:52:35 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)="3970fe", 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 1004.109579] XFS (loop2): device supports 512 byte sectors (not 0) 00:52:35 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 1004.393661] XFS (loop3): Mounting V4 Filesystem [ 1004.423257] XFS (loop3): totally zeroed log [ 1004.462537] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:52:35 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\b', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 1004.525095] XFS (loop1): device supports 512 byte sectors (not 0) 00:52:35 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:52:35 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x440, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 1005.259373] XFS (loop5): Mounting V4 Filesystem [ 1005.286739] XFS (loop5): totally zeroed log [ 1005.318974] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 1005.619113] XFS (loop4): SB sanity check failed [ 1005.624041] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 00:52:36 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 1005.738092] XFS (loop4): Unmount and run xfs_repair [ 1005.778718] XFS (loop4): First 128 bytes of corrupted metadata buffer: 00:52:36 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 1005.849563] XFS (loop3): Invalid superblock magic number [ 1005.871053] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1005.924395] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1006.020287] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 1006.028486] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 1006.067023] XFS (loop1): device supports 512 byte sectors (not 0) 00:52:37 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 1006.160272] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 1006.168478] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1006.277949] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 1006.331915] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1006.340195] XFS (loop4): SB validate failed with error -117. 00:52:37 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:52:37 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xa000000, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:52:37 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x8480, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 1006.906050] 9pnet: p9_errstr2errno: server reported unknown error [ 1007.062367] 9pnet: p9_errstr2errno: server reported unknown error 00:52:38 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 1007.272677] XFS (loop5): Mounting V4 Filesystem [ 1007.298848] XFS (loop5): totally zeroed log [ 1007.325191] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 1007.459699] XFS (loop3): Mounting V4 Filesystem [ 1007.510887] XFS (loop3): totally zeroed log [ 1007.560544] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:52:38 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:52:38 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xe000000, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 1007.813388] XFS (loop2): device supports 512 byte sectors (not 0) [ 1007.838544] kauditd_printk_skb: 185 callbacks suppressed [ 1007.838560] audit: type=1400 audit(1542156758.717:23005): avc: denied { map } for pid=3396 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1007.906555] XFS (loop4): SB sanity check failed [ 1007.943647] XFS (loop1): device supports 512 byte sectors (not 0) [ 1007.970399] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 1008.004156] XFS (loop4): Unmount and run xfs_repair [ 1008.031688] XFS (loop4): First 128 bytes of corrupted metadata buffer: 00:52:39 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 1008.064480] audit: type=1400 audit(1542156758.717:23006): avc: denied { map } for pid=3396 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1008.110170] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1008.150340] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1008.158552] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 1008.335310] audit: type=1400 audit(1542156758.757:23007): avc: denied { map } for pid=3396 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:39 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffff8100, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 1008.500436] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 1008.508638] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 1008.530344] audit: type=1400 audit(1542156758.777:23008): avc: denied { map } for pid=3411 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1008.586070] 9pnet: p9_errstr2errno: server reported unknown error [ 1008.659477] audit: type=1400 audit(1542156758.777:23009): avc: denied { map } for pid=3396 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1008.660875] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1008.713488] 9pnet: p9_errstr2errno: server reported unknown error [ 1008.810531] audit: type=1400 audit(1542156758.787:23010): avc: denied { map } for pid=3411 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1008.840758] audit: type=1400 audit(1542156758.787:23011): avc: denied { map } for pid=3401 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1008.845184] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 1008.911795] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1008.939707] XFS (loop4): SB validate failed with error -117. 00:52:39 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 1008.956334] audit: type=1400 audit(1542156758.807:23012): avc: denied { map } for pid=3401 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:39 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1e000000, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 1009.122476] audit: type=1400 audit(1542156758.807:23013): avc: denied { map } for pid=3411 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1009.157422] audit: type=1400 audit(1542156758.867:23014): avc: denied { map } for pid=3411 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1009.258596] XFS (loop3): Mounting V4 Filesystem [ 1009.298881] XFS (loop3): totally zeroed log [ 1009.319359] XFS (loop5): Mounting V4 Filesystem [ 1009.353029] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 1009.368029] XFS (loop5): totally zeroed log [ 1009.379539] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 1009.498479] XFS (loop2): device supports 512 byte sectors (not 0) 00:52:40 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x13000000, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:52:40 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:52:40 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673ff", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 1010.257060] 9pnet: p9_errstr2errno: server reported unknown error [ 1010.358721] XFS (loop1): device supports 512 byte sectors (not 0) 00:52:41 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:52:41 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffff002e, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 1010.651921] XFS (loop4): SB sanity check failed [ 1010.662394] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 1010.737150] XFS (loop4): Unmount and run xfs_repair [ 1010.750513] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 1010.789584] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1010.808901] XFS (loop5): Mounting V4 Filesystem [ 1010.820366] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1010.874652] XFS (loop5): totally zeroed log [ 1010.881667] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 1010.902261] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 1010.909666] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 1010.950348] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 1011.060822] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1011.140907] XFS (loop3): Mounting V4 Filesystem [ 1011.170721] XFS (loop3): totally zeroed log [ 1011.219909] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 1011.220250] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 1011.283550] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00:52:42 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 1011.356464] XFS (loop4): SB validate failed with error -117. 00:52:42 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffff10, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 1011.678939] 9pnet: p9_errstr2errno: server reported unknown error 00:52:42 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 1011.729199] 9pnet: p9_errstr2errno: server reported unknown error 00:52:42 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:52:42 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 1012.308474] XFS (loop1): device supports 512 byte sectors (not 0) 00:52:43 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffff30, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 1012.955448] kauditd_printk_skb: 149 callbacks suppressed [ 1012.955463] audit: type=1400 audit(1542156763.837:23164): avc: denied { map } for pid=3578 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1012.967152] 9pnet: p9_errstr2errno: server reported unknown error [ 1013.070845] XFS (loop5): Mounting V4 Filesystem [ 1013.094608] XFS (loop5): totally zeroed log [ 1013.117720] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 1013.153546] audit: type=1400 audit(1542156763.867:23165): avc: denied { map } for pid=3577 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1013.187318] XFS (loop2): device supports 512 byte sectors (not 0) [ 1013.203169] XFS (loop4): SB sanity check failed [ 1013.208312] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff 00:52:44 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 1013.278954] XFS (loop4): Unmount and run xfs_repair [ 1013.311584] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 1013.329875] audit: type=1400 audit(1542156763.877:23166): avc: denied { map } for pid=3577 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1013.354504] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1013.400341] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1013.430392] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 00:52:44 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667302", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 1013.450056] audit: type=1400 audit(1542156763.887:23167): avc: denied { map } for pid=3578 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1013.528369] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 1013.575637] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ 00:52:44 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 1013.662424] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1013.751556] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 1013.807183] audit: type=1400 audit(1542156763.887:23168): avc: denied { map } for pid=3578 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1013.935981] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1013.972813] XFS (loop1): device supports 512 byte sectors (not 0) [ 1013.979209] XFS (loop3): Invalid superblock magic number [ 1014.041963] XFS (loop4): SB validate failed with error -117. [ 1014.084763] audit: type=1400 audit(1542156763.887:23169): avc: denied { map } for pid=3578 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1014.171071] audit: type=1400 audit(1542156763.917:23170): avc: denied { map } for pid=3577 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1014.198265] audit: type=1400 audit(1542156763.927:23171): avc: denied { map } for pid=3577 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1014.229621] audit: type=1400 audit(1542156763.997:23172): avc: denied { map } for pid=3578 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1014.255810] audit: type=1400 audit(1542156763.997:23173): avc: denied { map } for pid=3577 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:45 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0xa00, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:52:45 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:52:45 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 1014.702224] 9pnet: p9_errstr2errno: server reported unknown error 00:52:45 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 1015.041777] XFS (loop2): device supports 512 byte sectors (not 0) 00:52:46 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:52:46 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 1015.743656] XFS (loop3): Invalid superblock magic number [ 1015.755713] XFS (loop1): Invalid superblock magic number 00:52:46 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x14, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:52:46 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x7d, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 1016.154550] 9pnet: p9_errstr2errno: server reported unknown error [ 1016.299683] 9pnet: p9_errstr2errno: server reported unknown error [ 1016.340077] XFS (loop4): SB sanity check failed [ 1016.359038] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x4b2/0x600, xfs_sb block 0xffffffffffffffff [ 1016.423806] XFS (loop4): Unmount and run xfs_repair [ 1016.429032] XFS (loop4): First 128 bytes of corrupted metadata buffer: 00:52:47 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)="397004", 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 1016.500322] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 1016.523699] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1016.656187] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 1016.714126] XFS (loop5): Mounting V4 Filesystem [ 1016.725130] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 1016.743911] XFS (loop5): totally zeroed log [ 1016.768964] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 1016.799560] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 1016.854881] XFS (loop2): device supports 512 byte sectors (not 0) [ 1016.900951] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 1016.937352] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 1017.031652] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00:52:47 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="78667303", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 1017.090407] XFS (loop4): SB validate failed with error -117. 00:52:48 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:52:48 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x9900, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 1017.684911] XFS (loop3): Invalid superblock magic number [ 1017.723796] XFS (loop1): Invalid superblock magic number [ 1017.967871] kauditd_printk_skb: 171 callbacks suppressed [ 1017.967887] audit: type=1400 audit(1542156768.847:23345): avc: denied { map } for pid=3754 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:48 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xbc0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:52:48 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 1018.241134] audit: type=1400 audit(1542156768.867:23346): avc: denied { map } for pid=3749 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:49 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 1018.452034] audit: type=1400 audit(1542156768.877:23347): avc: denied { map } for pid=3749 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1018.642038] XFS (loop2): device supports 512 byte sectors (not 0) [ 1018.648746] audit: type=1400 audit(1542156768.887:23348): avc: denied { map } for pid=3764 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1018.836281] audit: type=1400 audit(1542156768.887:23349): avc: denied { map } for pid=3764 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:49 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 1019.020638] audit: type=1400 audit(1542156768.897:23350): avc: denied { map } for pid=3754 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1019.204531] audit: type=1400 audit(1542156768.967:23351): avc: denied { map } for pid=3764 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:50 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x8e00, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) 00:52:50 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 1019.376171] audit: type=1400 audit(1542156769.017:23352): avc: denied { map } for pid=3764 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1019.512773] audit: type=1400 audit(1542156769.037:23353): avc: denied { map } for pid=3764 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1019.556420] audit: type=1400 audit(1542156769.087:23354): avc: denied { map } for pid=3764 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1019.584091] XFS (loop3): Invalid superblock magic number [ 1019.798680] XFS (loop1): device supports 512 byte sectors (not 0) [ 1019.820405] 9pnet: p9_errstr2errno: server reported unknown error 00:52:50 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 1019.937434] 9pnet: p9_errstr2errno: server reported unknown error 00:52:51 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)="397003", 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:52:51 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffff0030, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 1020.463080] XFS (loop2): device supports 512 byte sectors (not 0) 00:52:51 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 1020.855347] XFS (loop5): Mounting V4 Filesystem [ 1020.882108] XFS (loop5): totally zeroed log [ 1020.909299] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:52:52 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 1021.182273] XFS (loop1): device supports 512 byte sectors (not 0) [ 1021.256029] XFS (loop3): Mounting V4 Filesystem [ 1021.302966] XFS (loop3): totally zeroed log 00:52:52 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0xc400, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 1021.325061] XFS (loop3): Failed to read root inode 0x100000000080, error 22 00:52:52 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffff5000, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 00:52:52 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) 00:52:52 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffcb, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 1022.148890] XFS (loop2): device supports 512 byte sectors (not 0) 00:52:53 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)="786673ff", &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 1022.577438] XFS (loop1): device supports 512 byte sectors (not 0) [ 1022.719222] XFS (loop5): Mounting V4 Filesystem [ 1022.750438] XFS (loop5): totally zeroed log [ 1022.778917] XFS (loop5): Failed to read root inode 0x100000000080, error 22 00:52:53 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffff0180, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) [ 1022.907172] 9pnet: p9_errstr2errno: server reported unknown error [ 1022.983358] kauditd_printk_skb: 212 callbacks suppressed [ 1022.983373] audit: type=1400 audit(1542156773.867:23561): avc: denied { map } for pid=3925 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:54 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) 00:52:54 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000007ffff"], 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7}, 0x257) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 1023.292144] audit: type=1400 audit(1542156773.947:23562): avc: denied { map } for pid=3925 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1023.330265] audit: type=1400 audit(1542156773.977:23563): avc: denied { map } for pid=3925 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1023.359627] audit: type=1400 audit(1542156774.017:23564): avc: denied { map } for pid=3933 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:54 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0xa100, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a402000100001000", 0x6d}], 0x0, &(0x7f0000000040)) [ 1023.405759] XFS (loop3): Mounting V4 Filesystem [ 1023.474108] XFS (loop3): totally zeroed log [ 1023.560781] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 1023.681433] audit: type=1400 audit(1542156774.107:23565): avc: denied { map } for pid=3933 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1023.814147] audit: type=1400 audit(1542156774.127:23566): avc: denied { map } for pid=3933 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:54 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3000000, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)) [ 1024.129109] audit: type=1400 audit(1542156774.137:23567): avc: denied { map } for pid=3925 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1024.160048] audit: type=1400 audit(1542156774.147:23568): avc: denied { map } for pid=3933 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1024.189621] audit: type=1400 audit(1542156774.177:23569): avc: denied { map } for pid=3925 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1024.415031] audit: type=1400 audit(1542156774.207:23570): avc: denied { map } for pid=3935 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1024.480257] XFS (loop1): device supports 512 byte sectors (not 0) [ 1024.634279] ------------[ cut here ]------------ [ 1024.665280] refcount_t: underflow; use-after-free. [ 1024.696114] WARNING: CPU: 0 PID: 3966 at lib/refcount.c:187 refcount_sub_and_test_checked+0x2c9/0x310 [ 1024.705490] Kernel panic - not syncing: panic_on_warn set ... [ 1024.711390] CPU: 0 PID: 3966 Comm: syz-executor0 Not tainted 4.20.0-rc2+ #112 [ 1024.718662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1024.728021] Call Trace: [ 1024.730620] dump_stack+0x244/0x39d [ 1024.734271] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1024.739575] panic+0x2ad/0x55c [ 1024.742809] ? add_taint.cold.5+0x16/0x16 [ 1024.746986] ? __warn.cold.8+0x5/0x45 [ 1024.750812] ? refcount_sub_and_test_checked+0x2c9/0x310 [ 1024.756278] __warn.cold.8+0x20/0x45 [ 1024.760005] ? rcu_softirq_qs+0x20/0x20 [ 1024.763992] ? refcount_sub_and_test_checked+0x2c9/0x310 [ 1024.769454] report_bug+0x254/0x2d0 [ 1024.773148] do_error_trap+0x11b/0x200 [ 1024.777057] do_invalid_op+0x36/0x40 [ 1024.780784] ? refcount_sub_and_test_checked+0x2c9/0x310 [ 1024.786250] invalid_op+0x14/0x20 [ 1024.789722] RIP: 0010:refcount_sub_and_test_checked+0x2c9/0x310 [ 1024.795794] Code: 89 de e8 ea 1a ed fd 84 db 74 07 31 db e9 4d ff ff ff e8 0a 1a ed fd 48 c7 c7 20 ae 60 88 c6 05 7b fd 7e 06 01 e8 67 7d b6 fd <0f> 0b 31 db e9 2c ff ff ff 48 89 cf e8 a6 67 30 fe e9 41 fe ff ff [ 1024.814707] RSP: 0018:ffff88817e87f330 EFLAGS: 00010282 [ 1024.820081] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffc90005e51000 [ 1024.827362] RDX: 00000000000222c2 RSI: ffffffff8165e7e5 RDI: 0000000000000005 [ 1024.834660] RBP: ffff88817e87f418 R08: ffff8881866ba640 R09: ffffed103b5c5020 [ 1024.841938] R10: ffffed103b5c5020 R11: ffff8881dae28107 R12: ffff88817c7a7008 [ 1024.849221] R13: 00000000ffffffff R14: ffff88817e87f3f0 R15: ffff8881c1dc9d68 [ 1024.856523] ? vprintk_func+0x85/0x181 [ 1024.860441] ? refcount_inc_not_zero_checked+0x2f0/0x2f0 [ 1024.865909] ? trace_hardirqs_on+0xbd/0x310 [ 1024.870246] ? p9_fd_close+0x356/0x6b0 [ 1024.874151] ? trace_hardirqs_off_caller+0x310/0x310 [ 1024.879277] ? add_wait_queue+0x2b0/0x2b0 [ 1024.883444] refcount_dec_and_test_checked+0x1a/0x20 [ 1024.888559] p9_req_put+0x20/0x60 [ 1024.892028] p9_fd_close+0x39f/0x6b0 [ 1024.895769] ? p9_fd_cancel+0x380/0x380 [ 1024.899775] ? p9_fd_show_options+0x1c0/0x1c0 [ 1024.904299] p9_client_create+0xbd0/0x1674 [ 1024.908558] ? p9_client_read+0xb50/0xb50 [ 1024.912794] ? nft_reject_inet_eval+0x638/0x650 [ 1024.917490] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1024.923044] ? check_preemption_disabled+0x48/0x280 [ 1024.928075] ? __lockdep_init_map+0x105/0x590 [ 1024.932597] ? lockdep_init_map+0x9/0x10 [ 1024.936679] ? kasan_check_write+0x14/0x20 [ 1024.940925] ? __init_rwsem+0x1cc/0x2a0 [ 1024.944910] ? spin_dump.cold.3+0xe7/0xe7 [ 1024.949080] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1024.954113] ? save_stack+0xa9/0xd0 [ 1024.957770] v9fs_session_init+0x217/0x1bb0 [ 1024.962107] ? v9fs_session_init+0x217/0x1bb0 [ 1024.966621] ? find_held_lock+0x36/0x1c0 [ 1024.970715] ? nft_reject_inet_eval+0x638/0x650 [ 1024.975409] ? v9fs_show_options+0x7e0/0x7e0 [ 1024.979830] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1024.985380] ? check_preemption_disabled+0x48/0x280 [ 1024.990420] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1024.995975] ? rcu_pm_notify+0xc0/0xc0 [ 1024.999890] ? v9fs_mount+0x61/0x8f0 [ 1025.003617] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1025.008648] ? kmem_cache_alloc_trace+0x353/0x750 [ 1025.013517] v9fs_mount+0x7c/0x8f0 [ 1025.017074] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1025.022627] mount_fs+0xae/0x31d [ 1025.026020] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1025.030620] ? may_umount+0xb0/0xb0 [ 1025.034261] ? _raw_read_unlock+0x2c/0x50 [ 1025.038424] ? __get_fs_type+0x97/0xc0 [ 1025.042338] do_mount+0x581/0x31f0 [ 1025.045907] ? check_preemption_disabled+0x48/0x280 [ 1025.050949] ? copy_mount_string+0x40/0x40 [ 1025.055250] ? copy_mount_options+0x5f/0x430 [ 1025.059690] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1025.064753] ? kmem_cache_alloc_trace+0x353/0x750 [ 1025.069612] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1025.075168] ? _copy_from_user+0xdf/0x150 [ 1025.079356] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1025.084928] ? copy_mount_options+0x315/0x430 [ 1025.089446] ksys_mount+0x12d/0x140 [ 1025.093088] __x64_sys_mount+0xbe/0x150 [ 1025.097082] do_syscall_64+0x1b9/0x820 [ 1025.100985] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1025.106364] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1025.111306] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1025.116192] ? trace_hardirqs_on_caller+0x310/0x310 [ 1025.121237] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1025.126276] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1025.131313] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1025.136176] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1025.141376] RIP: 0033:0x457569 [ 1025.144579] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1025.163489] RSP: 002b:00007f1d0faf5c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1025.171225] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457569 [ 1025.178503] RDX: 0000000020000600 RSI: 00000000200005c0 RDI: 0000000000000000 [ 1025.185794] RBP: 000000000072bf00 R08: 0000000020000240 R09: 0000000000000000 [ 1025.193070] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1d0faf66d4 [ 1025.200350] R13: 00000000004c2b12 R14: 00000000004d4278 R15: 00000000ffffffff [ 1025.208674] Kernel Offset: disabled [ 1025.212301] Rebooting in 86400 seconds..