76a818282442807ee400d2008b6a3509450078da63648000662056016226061686b4cc9c54030f0646a0208463c80255c508a5991838c0127ac9f939296d40614698b6654006cc0cc3470cac708e1132c71800421f11fb1c0078da636080803628ad02a53da0f43228fd084aab3142680046df02a2850100000000000008805cf90100535f0100ab010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000bd010000000000000100000000000000dc01", 0x200}, {0x0, 0x0, 0x1000ce4e}], 0x0, &(0x7f0000000380)) 08:10:26 executing program 1: epoll_create1(0x0) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000001c0)=0x930) ptrace$setregs(0xd, 0xffffffffffffffff, 0x2, 0x0) gettid() tkill(0x0, 0x0) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) [ 2143.338382][T23228] loop3: detected capacity change from 0 to 386 08:10:26 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0), 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x119) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000000), 0xa) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) [ 2143.448793][T23228] Currently only 4K block size supported! 08:10:26 executing program 4: perf_event_open(&(0x7f0000000580)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) getpeername(r0, 0x0, 0x0) 08:10:26 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f0000000400)=ANY=[]) chdir(&(0x7f0000000340)='./file0\x00') r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3fffffff}) [ 2143.528015][T23228] Mount JFS Failure: -22 [ 2143.532656][T23228] jfs_mount failed w/return code = -22 [ 2143.616722][T23228] loop3: detected capacity change from 0 to 386 [ 2143.654401][T23228] Currently only 4K block size supported! [ 2143.732738][T23228] Mount JFS Failure: -22 08:10:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="1400000052004f7fb3e4bf80a000080000000000", 0x14) recvmmsg(r0, &(0x7f0000005c80)=[{{0x0, 0x0, 0x0}}], 0x344, 0x10122, 0x0) [ 2143.808436][T23228] jfs_mount failed w/return code = -22 08:10:28 executing program 5: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000200)='io\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f00000002c0)=ANY=[], 0xfffffecc) recvmmsg(0xffffffffffffffff, &(0x7f00000043c0)=[{{0x0, 0x0, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f00000017c0), 0x2c2, 0x0, 0x0) r2 = socket(0x2, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r3) 08:10:28 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='io\x00') 08:10:28 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f004000000000000003000e00d0000200040000001e010000000000000502000000000000b901000000000000ed", 0x39}], 0x0, &(0x7f0000000140)=ANY=[]) 08:10:28 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000ff0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:10:28 executing program 1: syz_mount_image$udf(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x84, &(0x7f00000007c0)=ANY=[@ANYBLOB='volume=00000000000000000000,session=000000000000000000', @ANYRESDEC=0xee00, @ANYBLOB=',defcontext=user_u,dOnt', @ANYRESDEC, @ANYBLOB]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x30000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x7f, 0x0, 0x80, 0x2, 0x0, 0xfffffffffffffff9, 0x800, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x7ff}, 0x6a00, 0x0, 0xe5, 0x1, 0x0, 0x5bf8, 0x7, 0x0, 0xac43}, 0x0, 0xf, 0xffffffffffffffff, 0xd) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) sendfile(r0, r1, 0x0, 0xedc0) connect$inet6(r0, &(0x7f0000002cc0)={0xa, 0x4e22, 0x1f, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0xfffffffa}, 0x1c) socket$nl_generic(0x10, 0x3, 0x10) 08:10:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = getpid() getpriority(0x2, r1) 08:10:28 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000040), 0xe) 08:10:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x101}, 0x105}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0xd9f, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @loopback}, &(0x7f0000000380)=0x10) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40804) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r0, 0x8200) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="640125016401010200"/18, @ANYRES32, @ANYBLOB="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"]}}], 0x1, 0x4048884) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@local}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) write$cgroup_type(r1, &(0x7f0000000200), 0x175d900f) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000640)=[&(0x7f0000000500)='\x00', &(0x7f0000000540)='\x00', &(0x7f00000005c0)='batadv_slave_0\x00', &(0x7f0000000600)='{\x00'], 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f00000000c0)=0x8, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 08:10:28 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='/dev/loop0'], &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='squashfs\x00', 0x10011, 0x0) 08:10:28 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000300), 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) [ 2145.286495][T23271] loop3: detected capacity change from 0 to 386 08:10:28 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) close(r2) socket$inet6(0x10, 0x3, 0x0) read(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x200000000622c, 0x0) [ 2145.438489][T23271] Currently only 4K block size supported! [ 2145.480362][T23271] Mount JFS Failure: -22 [ 2145.484995][T23271] jfs_mount failed w/return code = -22 [ 2145.578981][T23271] loop3: detected capacity change from 0 to 386 [ 2145.611677][T23271] Currently only 4K block size supported! [ 2145.622314][T23271] Mount JFS Failure: -22 08:10:28 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000013a00)) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0), &(0x7f0000001280)={0x0, 0xfb, 0x13a, 0x0, 0x0, "6c09ecfa2d815613e88c55159d7bde32", "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"}, 0x13a, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001240)='freezer.self_freezing\x00', 0x0, 0x0) [ 2145.627784][T23271] jfs_mount failed w/return code = -22 08:10:29 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000640)) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f00000001c0)=0xaf) 08:10:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x200408d4, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="80", 0x1, 0xd4, 0x0, 0x0) 08:10:29 executing program 2: perf_event_open(&(0x7f0000000300)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x200000000, 0x0, 0x9, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000040)=""/98, 0x62}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x6c00, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x3) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, 0x0, 0x0) 08:10:29 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100fff0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:10:29 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001680)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00') ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) getdents64(r0, &(0x7f0000000140)=""/4096, 0x1000) syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6) 08:10:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020971e457dad0755d40000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000001580)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}], 0x0, &(0x7f00000000c0)) 08:10:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000033c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0x2000}}], 0x1, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154, 0x9a}], 0x1, 0x0, 0x0) 08:10:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1ff}], 0x0, &(0x7f0000000140)=ANY=[]) 08:10:29 executing program 2: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x5}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r1 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x107382) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FITRIM(r2, 0xc0185879, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f00000004c0)={0x3, 0x80, 0x0, 0x0, 0x9, 0xf6, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x79, 0x9, 0x2, 0xffffffff, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000000000000}, r3, 0xe, r0, 0x1) pwritev(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000200)={[0x5]}, 0x0, &(0x7f0000000400), 0x8) openat$cgroup_root(0xffffff9c, &(0x7f0000000280)='./cgroup/syz1\x00', 0x200002, 0x0) sendfile(r1, r1, 0x0, 0x24002da8) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x16c}) [ 2145.929738][T23304] loop3: detected capacity change from 0 to 386 08:10:29 executing program 5: ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, &(0x7f00000001c0)={0x0, 0x539, 0x28}) syz_mount_image$udf(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x84, &(0x7f00000007c0)=ANY=[@ANYBLOB='volume=00000000000000000000,session=00000000000000000000,noadinicb,euid=', @ANYRESDEC=0xee00, @ANYBLOB=',defcontext=user_u,dOnt_meastr', @ANYRESDEC, @ANYBLOB]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x2, 0x0, 0xfffffffffffffff9, 0x800, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x7ff}, 0x6a00, 0x0, 0xe5, 0x0, 0x0, 0x5bf8, 0x7}, 0x0, 0xf, 0xffffffffffffffff, 0xd) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) sendfile(r0, r1, 0x0, 0xedc0) connect$inet6(r0, &(0x7f0000002cc0)={0xa, 0x4e22, 0x1f, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0xfffffffa}, 0x1c) 08:10:29 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x200000003, 0x84) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000001280)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x19403, 0x0) 08:10:29 executing program 2: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8, 0x3}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000440)={0x38, 0x2, 0x0, 0x3, 0x3, 0x0, 0x0, 0xf60}, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xba}, 0x481, 0x0, 0x0, 0x6, 0x100000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000180)={0x0, 0x4f2}) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e21, 0x7f, @private0={0xfc, 0x0, '\x00', 0x1}, 0x9}, 0x1c) sched_setaffinity(0x0, 0x8, &(0x7f0000000680)=0x36a) getrlimit(0x0, &(0x7f00000000c0)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 08:10:29 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xa}, 0x0) setrlimit(0x0, &(0x7f00000000c0)={0xa76, 0xc5a4}) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x10) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x6, 0x0, 0x2}, 0x0) clone(0x10002103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/udp\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 2146.023478][T23304] Currently only 4K block size supported! [ 2146.056027][T23304] Mount JFS Failure: -22 [ 2146.061997][T23304] jfs_mount failed w/return code = -22 08:10:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000640)) ioctl$PPPIOCSMAXCID(r1, 0x40047451, &(0x7f00000001c0)=0xaf) [ 2146.121169][T23304] loop3: detected capacity change from 0 to 386 [ 2146.133024][T23304] Currently only 4K block size supported! [ 2146.145835][T23304] Mount JFS Failure: -22 [ 2146.154994][T23304] jfs_mount failed w/return code = -22 08:10:29 executing program 4: r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x1) sendfile(r0, r1, 0x0, 0x4000000000010046) keyctl$dh_compute(0x17, &(0x7f0000000180), &(0x7f0000000240)=""/123, 0x7b, &(0x7f00000002c0)={&(0x7f00000001c0)={'streebog256\x00'}}) 08:10:29 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010feff0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:10:29 executing program 2: pipe(&(0x7f0000000080)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x6}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000240)='status\x00') vmsplice(r1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 08:10:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x68, &(0x7f0000000140)="c4c691219919da0709921456b3bde0ec638c3aebdef506eca593b01aa2933bba66409fe0ed6030312b6a190893480b604fe1ed0fee515e5c29dd460eac24e0d6bb6019ce4c317dfeaead2706ae8a5eb0c8282475d477d4b2fce1ae2b3b210cfd4c4d9e8e608cf81a"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:10:29 executing program 0: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='environ\x00') socket$inet6(0xa, 0x400000000001, 0x0) dup(0xffffffffffffffff) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) close(0xffffffffffffffff) pkey_alloc(0x0, 0x0) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x0, 0x0) munmap(&(0x7f00002d6000/0x4000)=nil, 0x4000) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) mremap(&(0x7f00002d1000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffa000/0x4000)=nil) 08:10:29 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='uid_map\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendfile(r1, r0, 0x0, 0x800007ff) 08:10:29 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55", 0x3f, 0x1c0}]) [ 2146.561866][T23341] loop3: detected capacity change from 0 to 386 [ 2146.621138][T23341] Currently only 4K block size supported! [ 2146.634183][T23346] loop4: detected capacity change from 0 to 1 [ 2146.663781][T23341] Mount JFS Failure: -22 [ 2146.680177][T23346] Dev loop4: unable to read RDB block 1 [ 2146.686660][T23346] loop4: unable to read partition table [ 2146.704936][T23341] jfs_mount failed w/return code = -22 [ 2146.724740][T23346] loop4: partition table beyond EOD, truncated [ 2146.759812][T23346] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2146.786687][T23341] loop3: detected capacity change from 0 to 386 [ 2146.810139][T23341] Currently only 4K block size supported! [ 2146.827273][T23341] Mount JFS Failure: -22 [ 2146.835048][T23341] jfs_mount failed w/return code = -22 08:10:30 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x800}], 0x200010, &(0x7f0000010d00)) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x800) 08:10:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() process_vm_writev(r0, &(0x7f0000000400)=[{&(0x7f0000000ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000003ac0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f00000006c0)=""/250, 0xfa}, {&(0x7f0000001ac0)=""/4096, 0x1000}, {0x0}, {0x0}], 0x9, 0x0) 08:10:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000344, 0x0) 08:10:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$sock_int(r1, 0x1, 0x2c, &(0x7f0000000080), &(0x7f0000000140)=0x4) 08:10:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)={0x14, 0x1, 0x8, 0x46eb37cd39c85cfb}, 0x14}}, 0x0) 08:10:30 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000003", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:10:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(r0, &(0x7f0000008400)={0x0, 0x0, &(0x7f00000083c0)={&(0x7f00000082c0)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x40) 08:10:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'wlc\x00'}, {@private}}, 0x44) 08:10:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f00000022c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x1c, r2, 0xb3b5e43e2d665541, 0x0, 0x0, {{}, {0x0, 0x410c}, {0x4c, 0x14, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 08:10:30 executing program 0: mount$fuse(0x0, &(0x7f0000002100)='./file0\x00', &(0x7f0000002140), 0x0, 0x0) [ 2147.600876][T23375] loop3: detected capacity change from 0 to 386 08:10:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000080)={0x2b, 0x8, 0x0, 0x0, 0x0, 0x0, 0x8}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 2147.683723][T23375] jfs_mount: Mount Failure: superblock is corrupt! 08:10:31 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, r0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) fspick(0xffffffffffffff9c, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) [ 2147.742555][T23375] Mount JFS Failure: -22 [ 2147.811688][T23375] jfs_mount failed w/return code = -22 [ 2147.902557][T23375] loop3: detected capacity change from 0 to 386 [ 2147.952189][T23375] jfs_mount: Mount Failure: superblock is corrupt! [ 2147.996910][T23375] Mount JFS Failure: -22 08:10:31 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000403) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xc, r1, 0x0, 0x2}) socket$xdp(0x2c, 0x3, 0x0) 08:10:31 executing program 2: syz_io_uring_setup(0x6dc6, &(0x7f0000000180), &(0x7f000090f000/0x2000)=nil, &(0x7f0000800000/0x800000)=nil, &(0x7f0000000200), &(0x7f0000000240)) 08:10:31 executing program 1: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000c80), 0x4) 08:10:31 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x77e) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) clock_settime(0x0, &(0x7f0000000040)={0x0, 0x989680}) 08:10:31 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 'FN\x00'}) r1 = syz_open_pts(r0, 0x401) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)) syz_open_dev$vcsa(&(0x7f00000002c0), 0xffff, 0x10200) ioctl$TCFLSH(r1, 0x540b, 0x2) [ 2148.079553][T23375] jfs_mount failed w/return code = -22 08:10:31 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000005", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:10:31 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x30, r1, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}]}]}, 0x30}}, 0x0) 08:10:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="82bb7102cc6509f63760ce09f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdc09db24a04062f28e5dbbde8856729a952b010000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f292b8e3f78f4bf076484885fd412cc5b9eaa4e234147330c329a0f00feae78bea559cc4130924e7993d6b67c4a7eeb9698787e17266d1eaf7f3069add6ad000867f3676736563b627b1a95dbfdbed3c6d2665a6b3619ce6790552a040890db024c5788e376ec99dd2a04304724ad34000000000000000000104fe3f63a214969176f08ddb08b7e27a8fbd0ef3550da85690d8944f8b388cad7bc51289e65", 0xf6}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x36) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 08:10:31 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000779000/0x600000)=nil, 0x600000, 0x1000000000009) 08:10:31 executing program 0: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x698100, 0x0) 08:10:31 executing program 1: r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/vm/drop_caches\x00', 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r1, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, &(0x7f00000015c0)=[{&(0x7f0000000080)="e4", 0x1}, {&(0x7f0000000140)="4c2e2a51ba2bd30ddb068b208073ef8ed429ba622418d1b6733414d116525ce052ab205de697ed5a5d671c6f3d550a070f64e4104886deac8a3edf152019df02ad94b7d58bb583a5aecdbf7ba49db6d7a017a4801387d2ef0000eb2c511953b072a222a8c0524d33e3c77da5ade310ee19dd876c8a967312763f72216180fe84c927fb9fb6c588bd774cc1fc7c8d3b", 0x8f}, {&(0x7f0000000200)="7313f52468d59b3e94beef67fef409580e0db339fb85a646316718c37e3fd9b93a5e9d1cd9e86bb37d5b2f829549b20f", 0x30}, {&(0x7f0000000240)="eb4d935f836cf2781f2664268bd1988543f04faf5ead73cc262494c23a594549e2e18b6440939bb6174bc77c10aecc235efc2533bb91de09fcedcb3099d1449caa7038f6bc64d9ebecb5bf76bbf66a8bf1ddabcf1f29490dac5f6d92b3e5ecbd5fa56eb7b77fe7cdd415d370a2d0e03f211d912a239bb2567b60eaa1386cc997760d926d73e05e384fb03063239835d79cae470291ddd9de4835361c71b4c1915126d5b269ac9c211fe98988c6e5b6452764", 0xb2}, {&(0x7f0000000300)="74a8d584c9e5ea91430c8e38d7d0c0e7d1c27b03f3844b54836527aa2e3a2e40c4c4737536f3b1e4d2cc3475e97dc986f77f1340da444b12f2d152", 0x3b}, {&(0x7f0000000340)="1fb0ae5b86fca9a0f85e6432da211bea8e9ed0243cec7867", 0x18}, {&(0x7f0000000380)="c1312e1e957cae82a9e3fdc5249a2ac8ca819c67c349aa05bcd4fe9c2dbfc2bf965d22596411b2c0b85e0cd8dcf205858518686913ac6a5a52e6879d219c60c7d18ded186536e3a9fcd35c067d70d922cda5ce30c7a18229efd26cda3f43dc5e398f02f9081d619f2f79a74fdd11db40e3126f6d3a6174473ec2851109245e9ecc804b13b1cb8cb31249cc3af78a134fd5094455c5daa86f58c8ab56defd5e8e755260aaaa8a4d8eb15d4cced7095fd6d3d8d963079a09c63ac3ef7e003c35a924cc4d3282c19b849ab2fde08bd94acfa18c936de4610e9ffdf1db5a06a01902bd60", 0xe2}, {&(0x7f0000000480)="035125a34fcbf105e0db68f4c2b5bc8118209bdbad9f4f5a139a800df22c6e4fcd561b75d21ffc66817bc64f4cc8a1310cbb21a30a63fb49eec22667804624243b966c0238623a7125ef35d28b818a2f0050477ea7c60acce64a1393395263eeb9f39bc26aaa06ddfb559b256ea9c700d1e960042b56f14f2f8038e780901cc32625ef1c68f2923f66ceadf6bfd2f348b87c0f13fba0cbe4a04b35862df551f99fa107e3f4dad0d985350d6af0df4738e5861d911b46b9062723", 0xba}, {&(0x7f0000000800)="b3b58ebb960d4843b5601655b855f801443e567aa977d7bf0aab3b69bd45c291377ed1bf5189ad0897055171df068a63ed6bc4ace53637f12d5eca2d11b6993902a1ff51d5eefe35408c8b69c4b13894fd8bd4bc942ffe819700272151902a8513dc913382cd38fccd89d8e2d98037521a90", 0x72}, {&(0x7f00000005c0)="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", 0x208}], 0xa}}], 0x2, 0x0) write$sysctl(r0, &(0x7f00000000c0)='2\x00', 0x1) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000540), 0x18001, 0x0) write$sysctl(r0, &(0x7f0000000c00)='4\x00', 0x2) 08:10:31 executing program 2: openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x187000, 0x0) [ 2148.496655][T23425] loop3: detected capacity change from 0 to 386 [ 2148.529339][T23425] jfs_mount: Mount Failure: superblock is corrupt! [ 2148.571414][T23425] Mount JFS Failure: -22 [ 2148.576021][T23425] jfs_mount failed w/return code = -22 [ 2148.628394][T23425] loop3: detected capacity change from 0 to 386 [ 2148.637508][T23425] jfs_mount: Mount Failure: superblock is corrupt! [ 2148.644878][T23425] Mount JFS Failure: -22 [ 2148.659959][T23425] jfs_mount failed w/return code = -22 08:10:32 executing program 5: semtimedop(0x0, 0x0, 0x0, &(0x7f0000000040)) 08:10:32 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000001600)={'sit0\x00', 0x0}) 08:10:32 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x20000009}, 0x0) sched_setattr(0x0, &(0x7f0000000200)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x200000000011, r2, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) r3 = socket$phonet(0x23, 0x2, 0x1) r4 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240), 0x40, 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) io_submit(0x0, 0x4, &(0x7f00000006c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x5, 0x3, r1, &(0x7f0000000100)="691fd89f7be2e35201958bc0b26a38c34e4d06a4901721fede7b7428834f7a9154a07aa86aa7a63ea8f7a8f65f0a9b3639a6ddcdfc8f", 0x36, 0xfffffffffffffffb}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x6, 0xb4f, r3, &(0x7f00000003c0)="92b4ea1df82789e4363c454975b09bca89e659393132d2bcba07880ba48a57cd6298cba5dd812ed73e76ab3d44a90deac07df3d7c886a449924021d642b44676ce1ed5177113b455eb98f6684c3fee256209a3fede98c57420ac19561925c7565f3495796eb7901512650e1955751ccc897f8c7a98615eec3c54eac2cf6df466bc24d566a700cb46ee26481c1bd18088f32e203644e73e3b28359fea54302f27ea6f9746934348ef810e5dccbf1a323b82c832843550b248ceb16e63c8c5dedb6f97c6bb377eeeaf029cc0a9fa0b905ca056b997256df0e4a95db47bab27b90f68c8ede8a3228733a237ed40a0b736", 0xef, 0x800, 0x0, 0x3}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0xa04, r4, &(0x7f00000004c0)="e59664a81f009ab91e5b79ca550df532f8c4b0eef9d0603533bc9cf45ab134ea82435752b916b0a7d16956dd0f3e40362c312f3457764ceea9240b9415ab0420c2404ccd98fc336dcd0d404c7db21535f869ddf1da5725d6fd006f6c8b7eb9c070d7444c7ddbdb92029db3d1bc851a78b1d137987db42bfb5752c0be9ca2a7ccf2b565cae22c336df81655dcd8adbc9953072915fb361983e88789db7c2ec98cf1c215b1c581617eb29b3aee63764933e904454d24b372bae0e1b04c946dec28e797e8c02ca797192ede9f33575e6263810b2c1e3f66b5763ec5474ad20ecaef178345a40cf3f535f5f12eb2d4a3", 0xee, 0xfffffffffffffac5, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000005c0)="e7d01b687d94f835709d7d78325bab60237d372d744ae09f95dd0eae9f52bfda0ac0138b69668a4809a9b0ac1739a002d1825b0bf1aa1a2b0bac43b97e9026bffff5765db5b961fc6e683d2245af40c4308f8fac5cbd9190317d9b931c1efc733fdaba743677167a9f1c046c17d8c169fd2b274bde3899bd487f5e256e314dca8822d394a4ae5c9505bf3c724baaea", 0x8f, 0x400, 0x0, 0x2, r5}]) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) sendto$inet6(r0, &(0x7f0000000200)="03", 0x7ffff000, 0x40080, 0x0, 0x1f4) pread64(0xffffffffffffffff, 0x0, 0x0, 0x1000) ioctl$VIDIOC_SUBDEV_G_SELECTION(0xffffffffffffffff, 0xc040563d, &(0x7f0000000000)={0x1, 0x0, 0x101, 0xf, {0xfff, 0x2, 0xa1ea, 0x10000}}) 08:10:32 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) 08:10:32 executing program 1: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x40}}, 0x0) 08:10:32 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000006", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:10:32 executing program 2: socket(0x10, 0x3, 0x1800) 08:10:32 executing program 4: r0 = socket(0x2, 0x3, 0x4) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) 08:10:32 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x5, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000080)='syzkaller\x00', 0x3fffc, 0x89, &(0x7f00000000c0)=""/137, 0x41000, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x3}, 0x8, 0x10, 0x0}, 0x78) 08:10:32 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000001240), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, 0x0) 08:10:32 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000080eff95"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000100)=ANY=[], 0xbf) unshare(0x20080) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) setxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000140), 0x2000) [ 2149.088658][T23450] loop3: detected capacity change from 0 to 386 08:10:32 executing program 2: socketpair(0x15, 0x5, 0xa, &(0x7f0000000500)) [ 2149.180682][T23450] jfs_mount: Mount Failure: superblock is corrupt! [ 2149.187525][T23450] Mount JFS Failure: -22 [ 2149.193654][T23450] jfs_mount failed w/return code = -22 [ 2149.271595][T23450] loop3: detected capacity change from 0 to 386 [ 2149.298721][T23450] jfs_mount: Mount Failure: superblock is corrupt! 08:10:32 executing program 5: getpeername$ax25(0xffffffffffffffff, 0x0, 0x0) 08:10:32 executing program 0: r0 = socket(0x11, 0xa, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), r0) 08:10:32 executing program 4: syz_mount_image$fuse(&(0x7f0000002240), &(0x7f0000002280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$pvfs2(&(0x7f0000002440), &(0x7f0000002480)='./file0\x00', 0x0, 0x2, &(0x7f0000002680)=[{&(0x7f00000024c0)='>', 0x1}, {&(0x7f00000025c0)='M', 0x1, 0x7}], 0x424a8, &(0x7f00000026c0)={[{'{:+'}, {'$'}], [{@fsmagic}]}) 08:10:32 executing program 5: r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 08:10:32 executing program 2: mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$vbi(&(0x7f0000000400), 0x0, 0x2) ioctl$VIDIOC_S_AUDIO(0xffffffffffffffff, 0x40345622, 0x0) syz_mount_image$pvfs2(&(0x7f0000004940), &(0x7f0000004980)='./file0\x00', 0x6, 0x4, &(0x7f0000004c80)=[{&(0x7f00000049c0)}, {&(0x7f0000004a00)="9172c51a914d01457f3f64a7ba0598a32492b7dd2c0ee663e550bdb1637969a0059d27c7b9fab2e0c5409f8baafae1ee58b9da5e456060c5ddba7c8f72ac307f13044740365c1ce96802ba344d68ef17db8c5db193071ea2d770a50e2c25c69f7d90aa0287a876185775c491485359a3c418a0fa9c7f67f4889d13a7548951d533ffec2acf9215d76f08645ae64ed6fe9a66cf90b6116470b2bccbcfd595f75d0481dce9f9fbdd04fd3f902a80904373a276f3296a983fe3f02a1044ae62948293772aecea4aa936ba9f1d6039642414be78e28f852e0e7faf3e8d41bd862b4ab57c20ca2d7f79e8bbdac08955a304947eb92b4886d39f1446e79143", 0xfc, 0x1ff}, {&(0x7f0000004b00)="0c77ccae96cabe55a4c8077d0acece8590cecd5dd983c4f56ed3bc9ec4aa85b05497a99107b4b80a7da2068360d642d39126159846be1e2494466352bb9484434dc4af190982f8f320436eec935b1aa3202071147be14307017dc54116e7b9e0cdf9161de2e66feaebb65afbaa527a80993c956cba919b628608dfa982b26618ff2affc5a5e397cde9cc9790e8b97dfc1292841df3d6945d2e119ead6e5f76b52467efd3b7320c91a8597838f4908e0eee27698a63803561da44ebf43f5fa353547842887b4d5720fdfc4076eb60ce783f4d488dc29c008fb50289565b33281ff3f8a8268909ca6b62455b2a", 0xec, 0x200}, {&(0x7f0000004c00)="0c6f5824d2e51469cffe0ea0c1c94e442683baa947447f8687f519cb1df2dba1d9887c4f79cfa164c7f85853d746510a3ba862768b3208a04c481fbf9a839a3576699afc5cdddc811c46daed0e79b67e00ae57a5ce5c2de2d16bc98606c5743df18eb9401dd4e0b2aeec68a466a0b179229c489fa5a157f9f413c7c630", 0x7d, 0x5c6}], 0xc, &(0x7f0000004d00)={[{':\'\'*[]'}, {'-'}, {'!]}.%/'}, {'max_read'}, {'/dev/full\x00'}], [{@subj_user={'subj_user', 0x3d, 'smackfstransmute'}}, {@subj_role={'subj_role', 0x3d, '/dev/fuse\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x40}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}) [ 2149.399032][T23450] Mount JFS Failure: -22 [ 2149.409131][T23450] jfs_mount failed w/return code = -22 08:10:32 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000007", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:10:32 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) 08:10:32 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, r0) 08:10:32 executing program 1: r0 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_MOVE(0x1e, r0, 0x0, 0xfffffffffffffffc, 0x0) 08:10:32 executing program 1: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$bt_hci(r1, 0x84, 0x83, &(0x7f0000001080)=""/4080, &(0x7f0000000080)=0xff0) 08:10:32 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000140)={0x0, 0x0, {}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 08:10:33 executing program 4: mmap$perf(&(0x7f0000ff3000/0xd000)=nil, 0xd000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 08:10:33 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SCALLUSERDATA(r0, 0x89e5, &(0x7f0000000180)={0x0, "20460938b4bb6e5b6495fba617dda7af1a01531dca681470119ee1f0063061633979f2509dbb967f709f83a868dad603b3cb2c9c1ef4ef8db6aa95819828be21e1423e8b40cf0944a3353f0c7efa759841d7af92c76234ae37babafe29568a0d451b55b8c46d69df4147fa1cc28131a8ea41719e898863f46e6643906ed0fe85"}) [ 2149.742257][T23488] loop3: detected capacity change from 0 to 386 08:10:33 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000100)={0x0, 0x2, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "269ba4a0"}, 0x0, 0x1, @fd}) 08:10:33 executing program 2: syz_open_procfs$namespace(0x0, 0x0) socketpair(0x1f, 0x0, 0x0, &(0x7f0000002140)) [ 2149.837093][T23488] jfs_mount: Mount Failure: superblock is corrupt! [ 2149.886848][T23488] Mount JFS Failure: -22 [ 2149.948469][T23488] jfs_mount failed w/return code = -22 [ 2150.008839][T23488] loop3: detected capacity change from 0 to 386 [ 2150.044145][T23488] jfs_mount: Mount Failure: superblock is corrupt! [ 2150.076594][T23488] Mount JFS Failure: -22 [ 2150.094763][T23488] jfs_mount failed w/return code = -22 08:10:33 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r0, &(0x7f0000001c80), 0x18) 08:10:33 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) 08:10:33 executing program 2: openat$char_raw_ctl(0xffffffffffffff9c, &(0x7f0000000040), 0x204080, 0x0) 08:10:33 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf}, 0x9) 08:10:33 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='+\x00', r0) 08:10:33 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000009", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:10:33 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) 08:10:33 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$bt_hci(r1, 0x84, 0x75, &(0x7f0000001080)=""/4080, &(0x7f0000000080)=0xff0) 08:10:33 executing program 1: socketpair(0x10, 0x0, 0x0, &(0x7f0000000500)) 08:10:33 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x0, 0x5, &(0x7f0000000580)=@raw=[@map={0x18, 0x5}, @alu={0x4, 0x0, 0x7, 0x8}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}], &(0x7f0000000800)='GPL\x00', 0x1, 0xdf, &(0x7f0000000600)=""/223, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000740)={0x5, 0x6, 0xf3a, 0xffff}, 0x10}, 0x78) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000140)=""/93) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000100)={0x2, 0x0, 0x3}) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000003b00)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000003ac0)={&(0x7f0000000400)=ANY=[@ANYBLOB="f4000000eb359595fba7f73cd7bf40cee0fd5aa42ad9f3112aaea80c71127c1ab9f173ebf919c96ff93464fe23302842984690ce927cc28a9e5b05688c62d6d79fa99a925a7d279073374b749feb9aa45edcfc209a0000bb4590236c94561aa826eb23f57ed3d11505000000cad8fb1bb5caf1", @ANYRES16=0x0, @ANYBLOB="020025bd7000fddbdf2503000000050005007f000000540001800800", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="600194cfd149", @ANYRES32=0x0, @ANYBLOB="0800030003000000140002007866726d3000", @ANYRES32=0x0, @ANYBLOB="14000200776c616e30000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="140002006772657461703000000000000000000048000180140002006272696467655f736c6176655f31000008000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f3100001400020074756e6c3000"/40], 0xf4}, 0x1, 0x0, 0x0, 0x40043}, 0x4000840) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f00000003c0)=ANY=[], 0x9) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 2150.510923][T23524] loop3: detected capacity change from 0 to 386 [ 2150.655113][T23524] jfs_mount: Mount Failure: superblock is corrupt! [ 2150.714800][T23524] Mount JFS Failure: -22 08:10:34 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x41, 0x1}, 0x40) 08:10:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}]}, 0x3c}}, 0x0) [ 2150.808427][T23524] jfs_mount failed w/return code = -22 [ 2150.851019][T23524] loop3: detected capacity change from 0 to 386 [ 2150.867507][T23524] jfs_mount: Mount Failure: superblock is corrupt! [ 2150.887046][T23524] Mount JFS Failure: -22 [ 2150.902352][T23524] jfs_mount failed w/return code = -22 08:10:34 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) write$vhost_msg(r0, 0x0, 0x0) 08:10:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$bfs(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x1, &(0x7f0000001440)=[{0x0}], 0x0, &(0x7f00000014c0)={[{}, {'net/snmp\x00'}]}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') 08:10:34 executing program 4: syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x9, &(0x7f00000000c0)) 08:10:34 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000a", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:10:34 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='flush']) mkdirat(r1, &(0x7f0000000100)='./file0\x00', 0x0) openat(r1, &(0x7f0000000080)='./file0/file0\x00', 0x1e12c0, 0x0) 08:10:34 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x420}, 0x420}}, 0x0) 08:10:34 executing program 2: pipe(&(0x7f0000000000)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00'}, 0x10) eventfd2(0x2, 0x80001) [ 2151.278400][T23554] loop3: detected capacity change from 0 to 386 08:10:34 executing program 0: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000005180)) 08:10:34 executing program 5: openat$nvram(0xffffffffffffff9c, 0x0, 0x400c1, 0x0) 08:10:34 executing program 2: syz_open_dev$I2C(&(0x7f00000000c0), 0x0, 0x0) 08:10:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(r0, &(0x7f0000008400)={&(0x7f0000008200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000083c0)={0x0}}, 0x40) 08:10:34 executing program 1: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000d00)={{0x12, 0x1, 0x0, 0x84, 0x3d, 0xb7, 0x10, 0x553, 0x202, 0x3207, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xbe, 0x38, 0x5b}}]}}]}}, 0x0) syz_usbip_server_init(0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) [ 2151.420123][T23559] fuse: Bad value for 'fd' [ 2151.427269][T23554] jfs_mount: Mount Failure: superblock is corrupt! 08:10:34 executing program 4: setsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, 0x0, 0x0) r0 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, 0x0) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000002c80), 0x1c0102, 0x0) syz_io_uring_setup(0x4ca4, &(0x7f0000002d40)={0x0, 0x50d3, 0x8}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000002dc0), &(0x7f0000002e00)) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) 08:10:34 executing program 2: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000080), 0xfffffdbb) [ 2151.500353][T23554] Mount JFS Failure: -22 [ 2151.504942][T23554] jfs_mount failed w/return code = -22 08:10:34 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14}, &(0x7f0000000300)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) io_setup(0x3, &(0x7f0000000140)=0x0) io_pgetevents(r1, 0x5, 0x5, &(0x7f00000001c0)=[{}, {}, {}, {}, {}], 0x0, &(0x7f0000000380)={&(0x7f00000000c0), 0x8}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 2151.611794][T23554] loop3: detected capacity change from 0 to 386 [ 2151.649228][T23554] jfs_mount: Mount Failure: superblock is corrupt! [ 2151.708599][T23554] Mount JFS Failure: -22 [ 2151.754415][T23554] jfs_mount failed w/return code = -22 08:10:35 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000b", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:10:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x5}]}]}, 0x58}}, 0x0) 08:10:35 executing program 0: syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) sysinfo(0x0) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, 0x0, 0x84) sysinfo(&(0x7f0000000300)=""/20) sysinfo(0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) 08:10:35 executing program 5: r0 = socket$kcm(0xa, 0x2, 0x73) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000100)={&(0x7f0000000040)=@un=@abs={0x0, 0x11, 0x1f4}, 0x80, 0x0}, 0x0) 08:10:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000440)=ANY=[@ANYBLOB="30010000000901030000000000000000010000070c00048008000140000000060800034079eb44190c00048008000140800000000c0004800800014000000004780002002c000180140003"], 0x130}}, 0x8) [ 2151.868105][ T6862] usb 2-1: new high-speed USB device number 72 using dummy_hcd 08:10:35 executing program 2: r0 = inotify_init1(0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000180)={0x0, r1}) rt_sigtimedwait(&(0x7f0000000040)={[0xad28]}, 0x0, 0x0, 0x8) r2 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fork() tkill(r3, 0x4) 08:10:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000003240)={0x0, 0x0, &(0x7f0000003200)={&(0x7f0000003140)={0x30, 0x2, 0x1, 0x201, 0x0, 0x0, {}, [@CTA_SEQ_ADJ_ORIG={0x14, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_AFTER={0x8}, @CTA_SEQADJ_OFFSET_AFTER={0x8}]}, @CTA_ID={0x8}]}, 0x30}}, 0x0) 08:10:35 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@private2, 0x0, 0x0, 0x2, 0x3, 0xffc0, 0xf982}, 0x20) [ 2152.148855][ T6862] usb 2-1: Using ep0 maxpacket: 16 [ 2152.183989][T23607] loop3: detected capacity change from 0 to 386 [ 2152.253680][T23607] jfs_mount: Mount Failure: superblock is corrupt! [ 2152.264105][T23607] Mount JFS Failure: -22 [ 2152.269696][T23607] jfs_mount failed w/return code = -22 [ 2152.278870][ T9383] usb 1-1: new high-speed USB device number 105 using dummy_hcd [ 2152.279069][ T6862] usb 2-1: New USB device found, idVendor=0553, idProduct=0202, bcdDevice=32.07 [ 2152.297314][ T6862] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2152.317617][T23607] loop3: detected capacity change from 0 to 386 [ 2152.327680][T23607] jfs_mount: Mount Failure: superblock is corrupt! [ 2152.341419][ T6862] usb 2-1: config 0 descriptor?? [ 2152.347030][T23607] Mount JFS Failure: -22 [ 2152.358561][T23607] jfs_mount failed w/return code = -22 [ 2152.391220][ T6862] gspca_main: stv0680-2.14.0 probing 0553:0202 08:10:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001d40)) 08:10:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="2c0000e4"], 0x2c}}, 0x0) 08:10:35 executing program 4: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000180)={&(0x7f0000000040), 0x18, &(0x7f00000000c0)={&(0x7f0000000000), 0xffef}}, 0x0) 08:10:35 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x40) 08:10:35 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000020c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:10:36 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETGAMMA(r0, 0xc02064a4, &(0x7f0000000100)={0x800, 0x0, 0x0, 0x0, 0x0}) [ 2152.726503][T23626] loop3: detected capacity change from 0 to 386 [ 2152.818464][T23626] Currently only 4K block size supported! [ 2152.818531][ T9383] usb 1-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 2152.824259][T23626] Mount JFS Failure: -22 [ 2152.824278][T23626] jfs_mount failed w/return code = -22 [ 2152.844072][ T9383] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2152.852995][ T9383] usb 1-1: Product: syz [ 2152.857675][ T9383] usb 1-1: Manufacturer: syz [ 2152.862937][ T9383] usb 1-1: SerialNumber: syz [ 2152.898398][T23626] loop3: detected capacity change from 0 to 386 [ 2152.909762][ T9383] usb 1-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 2152.938942][T23626] Currently only 4K block size supported! [ 2152.944822][T23626] Mount JFS Failure: -22 [ 2152.983334][T23626] jfs_mount failed w/return code = -22 [ 2153.448364][ T6862] gspca_stv0680: usb_control_msg error 0, request = 0x88, error = -71 [ 2153.457029][ T6862] stv0680 2-1:0.0: STV(e): camera ping failed!! [ 2153.478539][ T9383] usb 1-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 2153.507105][ T6862] gspca_stv0680: usb_control_msg error 0, request = 0x80, error = -71 [ 2153.536434][ T6862] stv0680 2-1:0.0: last error: 0, command = 0x0 [ 2153.548867][ T6862] usb 2-1: USB disconnect, device number 72 08:10:37 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000003c00)={0x0, 0x1, 0x6, @link_local}, 0x10) 08:10:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="85"]) bind(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 08:10:37 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x77e) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000280)={0x9, 0x8, 0x4, 0xe000, 0x1f, {r1, r2/1000+10000}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1, "54f13664"}, 0x7, 0x4, @planes=&(0x7f0000000140)={0x7, 0x80000001, @userptr=0x7}, 0x40, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000004, 0x4010, r3, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@local, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={0x0}}, 0x40005) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r4, 0x0) ioctl$FITRIM(r4, 0xc0185879, &(0x7f0000000180)={0xaf3, 0x7, 0x80000001}) 08:10:37 executing program 4: setsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000002980), 0x4) r0 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x8000) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000002b80)={0x0, 0x0, &(0x7f0000002b40)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x2001) ioctl$vim2m_VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, 0x0) openat$nvme_fabrics(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_io_uring_setup(0x4ca4, &(0x7f0000002d40)={0x0, 0x50d3, 0x8, 0x0, 0x329}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000002dc0), &(0x7f0000002e00)) syz_genetlink_get_family_id$l2tp(&(0x7f0000002e80), r0) 08:10:37 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000030c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:10:37 executing program 5: semtimedop(0x0, &(0x7f00000001c0)=[{0x2, 0x6}, {0x0, 0x0, 0x1000}], 0x2, 0x0) [ 2153.687103][T17416] usb 1-1: USB disconnect, device number 105 08:10:37 executing program 4: bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) pkey_alloc(0x0, 0x0) syz_usb_connect(0x2, 0x3f, &(0x7f0000000900)={{0x12, 0x1, 0x310, 0xe7, 0xf, 0xe8, 0x8, 0x1645, 0x7, 0x10f, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x2, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0xa6, 0x0, 0x0, 0x39, 0x21, 0x4f}}, {{0x9, 0x4, 0x0, 0x0, 0x2, 0x9c, 0x64, 0x9b, 0x0, [], [{{0x9, 0x5, 0x9}}, {{0x9, 0x5, 0x5}}]}}]}}]}}, &(0x7f0000000e80)={0xa, &(0x7f0000000d40)={0xa}, 0x35, &(0x7f0000000d80)={0x5, 0xf, 0x35, 0x4, [@ext_cap={0x7, 0x10, 0x2, 0x12}, @ss_container_id={0x14, 0x10, 0x4, 0x0, "c0265eb58b80876d3fdcdb8ee392a737"}, @generic={0xa, 0x10, 0x3, "3621768fa1952d"}, @wireless={0xb}]}}) 08:10:37 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:10:37 executing program 2: set_mempolicy(0x2, &(0x7f0000000000)=0xfffffffffffffff7, 0x3) r0 = syz_mount_image$tmpfs(&(0x7f0000000800), &(0x7f0000000840)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002080)=ANY=[]) symlinkat(&(0x7f0000000780)='./file0/file0\x00', r0, &(0x7f0000002100)='./file0\x00') 08:10:37 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) fsync(0xffffffffffffffff) [ 2153.846081][T23663] loop3: detected capacity change from 0 to 386 [ 2153.946404][T23663] Currently only 4K block size supported! 08:10:37 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f00000003c0)="88001c0000000000c7d1ec9b000000040800780914092a1af9b7", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)) [ 2153.995857][T23663] Mount JFS Failure: -22 08:10:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000300)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) [ 2154.049740][T23663] jfs_mount failed w/return code = -22 08:10:37 executing program 1: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$bt_hci(r1, 0x84, 0x70, &(0x7f0000001080)=""/4080, &(0x7f0000000080)=0xff0) [ 2154.113834][T23663] loop3: detected capacity change from 0 to 386 [ 2154.149996][T23663] Currently only 4K block size supported! [ 2154.208934][T23663] Mount JFS Failure: -22 08:10:37 executing program 0: syz_open_dev$mouse(&(0x7f0000000d40), 0x200, 0x0) [ 2154.276654][T23663] jfs_mount failed w/return code = -22 08:10:37 executing program 1: openat$nvram(0xffffffffffffff9c, &(0x7f000000a2c0), 0x17f341, 0x0) 08:10:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x44, r2, 0x1, 0x0, 0x0, {{}, {@void, @val={0x8, 0x3, r4}, @val={0xc}}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x4}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'netpci0\x00'}]}, 0x44}}, 0x0) [ 2154.338336][ T9380] usb 5-1: new full-speed USB device number 93 using dummy_hcd 08:10:37 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000040c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) [ 2154.548351][ T9383] ath9k_htc 1-1:1.0: ath9k_htc: Target is unresponsive [ 2154.556869][ T9383] ath9k_htc: Failed to initialize the device [ 2154.635258][T17416] usb 1-1: ath9k_htc: USB layer deinitialized [ 2154.778314][ T9380] usb 5-1: not running at top speed; connect to a high speed hub [ 2154.803751][T23705] loop3: detected capacity change from 0 to 386 [ 2154.858758][ T9380] usb 5-1: config 0 has an invalid interface number: 166 but max is 1 [ 2154.868735][T23705] Currently only 4K block size supported! [ 2154.871506][ T9380] usb 5-1: config 0 has no interface number 1 [ 2154.874661][T23705] Mount JFS Failure: -22 [ 2154.874680][T23705] jfs_mount failed w/return code = -22 [ 2154.881708][ T9380] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x9 has invalid wMaxPacketSize 0 [ 2154.902345][ T9380] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 2154.978919][T23705] loop3: detected capacity change from 0 to 386 [ 2154.987917][T23705] Currently only 4K block size supported! [ 2154.995116][T23705] Mount JFS Failure: -22 [ 2155.000124][T23705] jfs_mount failed w/return code = -22 [ 2155.074228][ T9380] usb 5-1: New USB device found, idVendor=1645, idProduct=0007, bcdDevice= 1.0f [ 2155.107015][ T9380] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2155.135101][ T9380] usb 5-1: Product: syz [ 2155.144525][ T9380] usb 5-1: Manufacturer: syz [ 2155.162420][ T9380] usb 5-1: SerialNumber: syz [ 2155.179349][ T9380] usb 5-1: config 0 descriptor?? [ 2155.229515][ T9380] usb-storage 5-1:0.166: USB Mass Storage device detected [ 2155.260829][ T9380] usb-storage 5-1:0.166: Quirks match for vid 1645 pid 0007: 4 [ 2155.325183][ T9380] usb-storage 5-1:0.0: USB Mass Storage device detected [ 2155.374228][ T9380] usb-storage 5-1:0.0: Quirks match for vid 1645 pid 0007: 4 08:10:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @private}}) 08:10:38 executing program 1: fork() ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) 08:10:38 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x89, &(0x7f00000000c0)=""/137, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:10:38 executing program 0: r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000440)) 08:10:38 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000050c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:10:38 executing program 4: unshare(0x40000000) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x3938700}, {0x0, r0+10000000}}, 0x0) timer_create(0x2, &(0x7f0000000480)={0x0, 0x16, 0x0, @thr={0x0, 0x0}}, &(0x7f00000004c0)=0x0) timer_settime(r1, 0x1, &(0x7f0000000540)={{0x77359400}, {0x0, 0x989680}}, 0x0) [ 2155.479314][ T9380] usb 5-1: USB disconnect, device number 93 08:10:38 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f0000000140)={0xfffffffffffffffd, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 08:10:38 executing program 2: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000180)={&(0x7f0000000040), 0x18, &(0x7f00000000c0)={&(0x7f0000000000), 0xffef}}, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) 08:10:38 executing program 0: syz_mount_image$vxfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001c40)=[{&(0x7f0000000840)="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", 0x7c1}], 0x0, 0x0) [ 2155.658371][T23743] loop3: detected capacity change from 0 to 386 08:10:39 executing program 2: add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffb) [ 2155.734665][T23743] Currently only 4K block size supported! [ 2155.746929][T23745] IPVS: ftp: loaded support on port[0] = 21 08:10:39 executing program 5: syz_io_uring_setup(0x61ff, &(0x7f00000003c0)={0x0, 0xcbd2, 0x8, 0x1, 0x1f2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000440), &(0x7f0000000480)) [ 2155.781761][T23743] Mount JFS Failure: -22 [ 2155.786712][T23743] jfs_mount failed w/return code = -22 08:10:39 executing program 0: getsockopt$PNPIPE_INITSTATE(0xffffffffffffffff, 0x113, 0x4, 0x0, 0x0) 08:10:39 executing program 1: r0 = syz_usb_connect(0x0, 0x24, &(0x7f00000000c0)=ANY=[@ANYBLOB="1201000066230f40ef170372dde100000001090212000100001a000904"], 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000100)={0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={0x40, 0xb, 0x2, "7b1a"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, &(0x7f00000008c0)={0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={0x40, 0xb, 0x2, "1b65"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000480)={0x2c, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000001000)={0x2c, &(0x7f0000000e00)={0x0, 0x0, 0x1, "cb"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) [ 2155.923559][T23743] loop3: detected capacity change from 0 to 386 [ 2155.957382][T23743] Currently only 4K block size supported! 08:10:39 executing program 2: r0 = syz_open_dev$cec(&(0x7f0000000480), 0x2, 0x2) ioctl$VIDIOC_QUERYBUF(r0, 0x5452, 0x0) [ 2156.038269][T23743] Mount JFS Failure: -22 08:10:39 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c40)={0x18, 0x1, &(0x7f0000001a40)=@raw=[@call], &(0x7f0000001a80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 2156.090967][T23743] jfs_mount failed w/return code = -22 08:10:39 executing program 0: syz_open_dev$sndpcmc(&(0x7f00000006c0), 0x4f99873d, 0x0) 08:10:39 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000060c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:10:39 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) 08:10:39 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4611, &(0x7f0000000140)) 08:10:39 executing program 0: openat$snapshot(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) 08:10:39 executing program 2: rseq(&(0x7f0000000000), 0x20, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000000940)=[{&(0x7f0000000700)='u', 0x1}], 0x1, 0x0, 0x0) [ 2156.478490][T20602] usb 2-1: new high-speed USB device number 73 using dummy_hcd [ 2156.486762][T23799] loop3: detected capacity change from 0 to 386 08:10:39 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="2f0000001c0005c5ffffff000d000000020000000b00c200ec0091c9130001", 0x1f}], 0x10000000000001b8}, 0x0) r0 = socket(0x10, 0x80002, 0x0) write(0xffffffffffffffff, &(0x7f00000000c0)="2400000058001f03ff17f403012304050a04f5110800010003010002080003", 0x1f) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x4924924924926dd, 0x0) [ 2156.672030][T23799] Currently only 4K block size supported! [ 2156.708299][T23799] Mount JFS Failure: -22 08:10:40 executing program 2: r0 = socket(0x11, 0x3, 0x0) setsockopt$PNPIPE_HANDLE(r0, 0x113, 0x3, 0x0, 0x0) 08:10:40 executing program 0: syz_open_dev$vbi(&(0x7f0000000400), 0x0, 0x2) syz_mount_image$pvfs2(0x0, 0x0, 0x0, 0x2, &(0x7f0000004c80)=[{0x0}, {&(0x7f0000004a00)="91", 0x1, 0x1ff}], 0x0, 0x0) [ 2156.729396][T23799] jfs_mount failed w/return code = -22 [ 2156.804670][T23799] loop3: detected capacity change from 0 to 386 [ 2156.820824][T23799] Currently only 4K block size supported! [ 2156.838470][T20602] usb 2-1: New USB device found, idVendor=17ef, idProduct=7203, bcdDevice=e1.dd [ 2156.847804][T20602] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2156.862887][T23799] Mount JFS Failure: -22 [ 2156.865328][T20602] usb 2-1: config 0 descriptor?? [ 2156.905235][T23799] jfs_mount failed w/return code = -22 08:10:40 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x20000009}, 0x0) sched_setattr(0x0, &(0x7f0000000200)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) r2 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240), 0x40, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) io_submit(0x0, 0x4, &(0x7f00000006c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x5, 0x3, r1, &(0x7f0000000100)="691fd89f7be2e35201958bc0b26a38c34e4d06a4901721fede7b7428834f7a9154a07aa86aa7a63ea8f7a8f65f0a9b3639a6ddcdfc8f", 0x36, 0xfffffffffffffffb}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x6, 0xb4f, 0xffffffffffffffff, &(0x7f00000003c0)="92b4ea1df82789e4363c454975b09bca89e659393132d2bcba07880ba48a57cd6298cba5dd812ed73e76ab3d44a90deac07df3d7c886a449924021d642b44676ce1ed5177113b455eb98f6684c3fee256209a3fede98c57420ac19561925c7565f3495796eb7901512650e1955751ccc897f8c7a98615eec3c54eac2cf6df466bc24d566a700cb46ee26481c1bd18088f32e203644e73e3b28359fea54302f27ea6f9746934348ef810e5dccbf1a323b82c832843550b248ceb16e63c8c5dedb6f97c6bb377eeeaf029cc0a9fa0b905ca056b997256df0e4a95db47bab27b90f68c8ede8a3228733a237ed40a0b736", 0xef, 0x800, 0x0, 0x3}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0xa04, r2, &(0x7f00000004c0)="e59664a81f009ab91e5b79ca550df532f8c4b0eef9d0603533bc9cf45ab134ea82435752b916b0a7d16956dd0f3e40362c312f3457764ceea9240b9415ab0420c2404ccd98fc336dcd0d404c7db21535f869ddf1da5725d6fd006f6c8b7eb9c070d7444c7ddbdb92029db3d1bc851a78b1d137987db42bfb5752c0be9ca2a7ccf2b565cae22c336df81655dcd8adbc9953072915fb361983e88789db7c2ec98cf1c215b1c581617eb29b3aee63764933e90445", 0xb3, 0xfffffffffffffac5, 0x0, 0x1}, 0x0]) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) sendto$inet6(r0, &(0x7f0000000200)="03", 0x7ffff000, 0x40080, 0x0, 0x1f4) pread64(0xffffffffffffffff, 0x0, 0x0, 0x1000) ioctl$VIDIOC_SUBDEV_G_SELECTION(0xffffffffffffffff, 0xc040563d, &(0x7f0000000000)={0x1, 0x0, 0x101, 0xf, {0xfff, 0x2, 0xa1ea, 0x10000}}) 08:10:40 executing program 4: connect$qrtr(0xffffffffffffffff, 0x0, 0x0) 08:10:40 executing program 2: syz_mount_image$efs(0x0, 0x0, 0x0, 0x1, &(0x7f00000015c0)=[{0x0}], 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) fork() 08:10:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_setup(0x7492, &(0x7f0000000040), &(0x7f00005fd000/0x4000)=nil, &(0x7f00005c2000/0x3000)=nil, &(0x7f00000000c0), 0x0) syz_io_uring_setup(0x6b52, &(0x7f0000000580), &(0x7f0000ffa000/0x3000)=nil, &(0x7f00005ea000/0x4000)=nil, &(0x7f0000000180), 0x0) syz_io_uring_setup(0x3db0, &(0x7f00000004c0), &(0x7f0000ffb000/0x1000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000540), &(0x7f0000000600)) 08:10:40 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$efs(&(0x7f0000000340), &(0x7f0000000380)='./file1\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f00000007c0)=ANY=[]) 08:10:40 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000070c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) [ 2157.138452][T20602] asix 2-1:0.0 (unnamed net_device) (uninitialized): Failed to read reg index 0x0000: -71 [ 2157.175414][T20602] asix: probe of 2-1:0.0 failed with error -71 08:10:40 executing program 2: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000180)={&(0x7f0000000040), 0x18, &(0x7f00000000c0)={&(0x7f0000000000), 0xffef}}, 0x0) close(r0) 08:10:40 executing program 0: clone(0x180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x10}]}}, &(0x7f0000000080)=""/259, 0x26, 0x103, 0x8}, 0x20) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000380)={'ip6gre0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) close(0xffffffffffffffff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 08:10:40 executing program 4: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="0200000000003434180100007a4a7934d9d44b9a000000003f00000000000000000010000000000004000000000000001000000005000000010000000000000004000000000000000000000000000000e003000000000000561b675f00000000571b675f00000000571b675f000000000100320000000100561b675f00000000004eed0000000000000000000b00000080002000c0001000dadd32bf8764466dbb0c25de8a84ef61", 0xa8, 0x400}, {&(0x7f0000010100)="dd6bcb1c8fa443cb11faaf1e", 0xc, 0x1000}, {0x0}, {0x0, 0x0, 0x104400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 2157.248531][T20602] usb 2-1: USB disconnect, device number 73 [ 2157.268517][T23830] loop3: detected capacity change from 0 to 386 [ 2157.319253][T23830] Currently only 4K block size supported! [ 2157.325222][T23830] Mount JFS Failure: -22 [ 2157.331041][T23830] jfs_mount failed w/return code = -22 08:10:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000080)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0xa}, 0x1c) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000)={0x0, 0x2710}, 0x10) sendmsg(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000000b80)="db", 0x1}], 0x1}, 0x0) 08:10:40 executing program 2: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000009b01) [ 2157.419943][T23830] loop3: detected capacity change from 0 to 386 [ 2157.496470][T23830] Currently only 4K block size supported! [ 2157.532706][T23850] loop4: detected capacity change from 0 to 4164 [ 2157.561281][T23850] NILFS (loop4): broken superblock, retrying with spare superblock (blocksize = 1024) [ 2157.565927][T23830] Mount JFS Failure: -22 [ 2157.573548][T23850] NILFS (loop4): mounting unchecked fs [ 2157.585739][T23850] NILFS (loop4): invalid segment: Inconsistency found [ 2157.593598][T23850] NILFS (loop4): unable to fall back to spare super block 08:10:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002700)={0xffffffffffffffff}) accept4$unix(r0, 0x0, 0x0, 0x80c00) [ 2157.605589][T23850] NILFS (loop4): error -22 while searching super root 08:10:41 executing program 4: openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x54ac2, 0x0) [ 2157.656248][T23830] jfs_mount failed w/return code = -22 08:10:41 executing program 1: epoll_create(0x4) 08:10:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000180)={[{@i_version}]}) 08:10:41 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000080c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) [ 2158.036482][T23872] loop3: detected capacity change from 0 to 386 [ 2158.081472][T23872] Currently only 4K block size supported! [ 2158.087268][T23872] Mount JFS Failure: -22 [ 2158.140458][T23872] jfs_mount failed w/return code = -22 [ 2158.193198][T23872] loop3: detected capacity change from 0 to 386 [ 2158.209331][T23872] Currently only 4K block size supported! [ 2158.217004][T23872] Mount JFS Failure: -22 [ 2158.221597][T23872] jfs_mount failed w/return code = -22 08:10:42 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) connect$unix(r3, &(0x7f0000000040)=@abs={0x0, 0x0, 0x4e24}, 0x6e) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x38, r5, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}]}]}, 0x38}}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000380)='mptcp_pm\x00') 08:10:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(0xffffffffffffffff, &(0x7f0000000240)={0x1d, r2}, 0x18) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 08:10:42 executing program 0: mount$fuse(0x0, 0x0, &(0x7f0000002140), 0x0, &(0x7f0000002180)) 08:10:42 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) 08:10:42 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) connect$pppl2tp(0xffffffffffffffff, 0x0, 0x0) 08:10:42 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000090c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:10:42 executing program 0: syz_usb_disconnect(0xffffffffffffffff) syz_usb_connect$hid(0x6, 0x36, 0x0, 0x0) r0 = syz_usb_connect(0x0, 0x2d, &(0x7f00000000c0)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581"], 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f00000024c0)={0x2c, &(0x7f0000002340), 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, &(0x7f00000020c0)={0x84, &(0x7f0000001c80)={0x0, 0x0, 0x19, "97bd15d3c74e12514856792f987451fd424f6b7e574078eeda"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 08:10:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0xffffe000) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) 08:10:42 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736616e0ca00088020000400000004f8000020004000030000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011200)) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) [ 2158.953088][T23891] loop3: detected capacity change from 0 to 386 [ 2158.985481][T23891] Currently only 4K block size supported! [ 2158.991669][T23891] Mount JFS Failure: -22 [ 2158.996048][T23891] jfs_mount failed w/return code = -22 08:10:42 executing program 1: socket$inet6(0xa, 0xf, 0x0) 08:10:42 executing program 5: syz_usb_connect(0x0, 0x24, &(0x7f0000000900)={{0x12, 0x1, 0x0, 0xe7, 0xf, 0xe8, 0x8, 0x1645, 0x7, 0x10f, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x39, 0x21, 0x4f}}]}}]}}, 0x0) [ 2159.076349][T23891] loop3: detected capacity change from 0 to 386 [ 2159.090189][T23891] Currently only 4K block size supported! [ 2159.104593][T23891] Mount JFS Failure: -22 [ 2159.113328][T23891] jfs_mount failed w/return code = -22 08:10:42 executing program 2: socket(0x0, 0x0, 0x0) r0 = syz_usb_connect$printer(0x0, 0x36, &(0x7f0000000380)=ANY=[@ANYBLOB="1201000009000008250592d2070000000101090224ff"], 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) syncfs(0xffffffffffffffff) syz_open_dev$char_usb(0xc, 0xb4, 0x0) [ 2159.243913][T23909] loop4: detected capacity change from 0 to 256 [ 2159.265432][T23909] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 08:10:42 executing program 1: syz_io_uring_complete(0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, 0x0) 08:10:42 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000a0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) [ 2159.319226][T23915] overlayfs: filesystem on './file0' not supported 08:10:42 executing program 1: socketpair(0x29, 0x5, 0x8, &(0x7f0000000000)) 08:10:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000000040)={0x14, 0x11, 0x9, 0x301}, 0x14}}, 0x0) 08:10:42 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000080)={0x0}}, 0x0) [ 2159.588465][T28872] usb 6-1: new high-speed USB device number 54 using dummy_hcd 08:10:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_GET(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000740)={0x18, r2, 0x701, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 08:10:43 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) [ 2159.781842][T23932] loop3: detected capacity change from 0 to 386 08:10:43 executing program 4: r0 = syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200020000100010005000000001c08107f13", 0x12, 0x400}, {&(0x7f0000010100)="ff000000feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff03f0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed415cf970000000e7c2645f530305", 0x80f, 0x800}, {&(0x7f0000010a00)="01", 0x1, 0x1400}], 0x0, &(0x7f0000000300)=ANY=[]) r1 = dup2(r0, r0) openat$incfs(r1, &(0x7f00000000c0)='.pending_reads\x00', 0x0, 0x0) [ 2159.898741][T20602] usb 3-1: new high-speed USB device number 51 using dummy_hcd [ 2159.967094][T23932] Currently only 4K block size supported! [ 2159.986288][T23932] Mount JFS Failure: -22 [ 2160.006554][T23932] jfs_mount failed w/return code = -22 08:10:43 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x172, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {&(0x7f00000004c0)}], 0x0, &(0x7f0000000540)=ANY=[]) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) syz_open_dev$usbfs(0x0, 0x0, 0x0) 08:10:43 executing program 1: r0 = syz_open_dev$swradio(&(0x7f00000001c0), 0x1, 0x2) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000200)={0x0, 0x0, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e9512451"}, 0x0, 0x0, @userptr}) [ 2160.098665][T23932] loop3: detected capacity change from 0 to 386 [ 2160.106887][T23941] loop4: detected capacity change from 0 to 20 [ 2160.122153][T28872] usb 6-1: Using ep0 maxpacket: 8 [ 2160.128447][T23932] Currently only 4K block size supported! [ 2160.134236][T23932] Mount JFS Failure: -22 [ 2160.141101][T20602] usb 3-1: Using ep0 maxpacket: 8 [ 2160.211319][T23941] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 2160.249901][T23932] jfs_mount failed w/return code = -22 [ 2160.260167][T20602] usb 3-1: config index 0 descriptor too short (expected 65316, got 36) [ 2160.279201][T20602] usb 3-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 2160.358383][T20602] usb 3-1: config 0 has no interfaces? [ 2160.449258][T20602] usb 3-1: New USB device found, idVendor=0525, idProduct=d292, bcdDevice= 0.07 [ 2160.466299][T20602] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 2160.501642][T20602] usb 3-1: SerialNumber: syz [ 2160.539576][T20602] usb 3-1: config 0 descriptor?? [ 2160.785080][T20602] usb 3-1: USB disconnect, device number 51 [ 2160.872087][ T3226] ieee802154 phy0 wpan0: encryption failed: -22 [ 2160.879857][ T3226] ieee802154 phy1 wpan1: encryption failed: -22 [ 2161.347726][T28872] usb 6-1: New USB device found, idVendor=1645, idProduct=0007, bcdDevice= 1.0f [ 2161.377076][T28872] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2161.407102][T28872] usb 6-1: Product: syz [ 2161.412851][T28872] usb 6-1: Manufacturer: syz [ 2161.436928][T28872] usb 6-1: SerialNumber: syz [ 2161.446739][T28872] usb 6-1: config 0 descriptor?? [ 2161.530139][T28872] usb-storage 6-1:0.0: USB Mass Storage device detected [ 2161.565919][T28872] usb-storage 6-1:0.0: Quirks match for vid 1645 pid 0007: 4 08:10:45 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x1e430300, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x40}}, 0x0) 08:10:45 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x20000009}, 0x0) sched_setattr(0x0, &(0x7f0000000200)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1000, 0x9, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x200000000011, r2, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="2ad64e75dc862951c4dd74ea2f342443b8f15269af7e7f4b5c716c80a3b2e4fc01e8ed739ff3336b5cd8757359bc69a3d5a377db24a22c4cf63d40b5ce62e441dd1ebf03d4ef13f853cb2c861188e039f89163f15bae004da8adccff5c53d46e19059f5a6df44f491edb7d7ae1493c84af5d000200004596a24533ffd3bad5d608b584242b3a451f0e50d31340fbb8c554105789862b60df74f940f02278e50c5ac4afd11510904654b3ca6635bce9b8", @ANYRESHEX], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) r3 = socket$phonet(0x23, 0x2, 0x1) r4 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240), 0x40, 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000300), 0x440, 0x0) io_submit(0x0, 0x4, &(0x7f00000006c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x5, 0x3, r1, &(0x7f0000000100)="691fd89f7be2e35201958bc0b26a38c34e4d06a4901721fede7b7428834f7a9154a07aa86aa7a63ea8f7a8f65f0a9b3639a6ddcdfc8f", 0x36, 0xfffffffffffffffb}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x6, 0xb4f, r3, &(0x7f00000003c0)="92b4ea1df82789e4363c454975b09bca89e659393132d2bcba07880ba48a57cd6298cba5dd812ed73e76ab3d44a90deac07df3d7c886a449924021d642b44676ce1ed5177113b455eb98f6684c3fee256209a3fede98c57420ac19561925c7565f3495796eb7901512650e1955751ccc897f8c7a98615eec3c54eac2cf6df466bc24d566a700cb46ee26481c1bd18088f32e203644e73e3b28359fea54302f27ea6f9746934348ef810e5dccbf1a323b82c832843550b248ceb16e63c8c5dedb6f97c6bb377eeeaf029cc0a9fa0b905ca056b997256df0e4a95db47bab27b90f68c8ede8a3228733a237ed40a0b736", 0xef, 0x800, 0x0, 0x3}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xe, 0xa04, r4, &(0x7f00000004c0)="e59664a81f009ab91e5b79ca550df532f8c4b0eef9d0603533bc9cf45ab134ea82435752b916b0a7d16956dd0f3e40362c312f3457764ceea9240b9415ab0420c2404ccd98fc336dcd0d404c7db21535f869ddf1da5725d6fd006f6c8b7eb9c070d7444c7ddbdb92029db3d1bc851a78b1d137987db42bfb5752c0be9ca2a7ccf2b565cae22c336df81655dcd8adbc9953072915fb361983e88789db7c2ec98cf1c215b1c581617eb29b3aee63764933e904454d24b372bae0e1b04c946dec28e797e8c02ca797192ede9f33575e6263810b2c1e3f66b5763ec5474ad20ecaef178345a40cf3f535f5f12eb2d4a3a4", 0xef, 0xfffffffffffffac5, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0xff, r1, &(0x7f00000005c0)="e7d01b687d94f835709d7d78325bab60237d372d744ae09f95dd0eae9f52bfda0ac0138b69668a4809a9b0ac1739a002d1825b0bf1aa1a2b0bac43b97e9026bffff5765db5b961fc6e683d2245af40c4308f8fac5cbd9190317d9b931c1efc733fdaba743677167a9f1c046c17d8c169fd2b274bde3899bd487f5e256e314dca8822d394a4ae5c9505bf3c724baaea22", 0x90, 0x400, 0x0, 0x2, r5}]) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x0, 0x40, 0x8, 0x9}, 0x0) sendto$inet6(r0, &(0x7f0000000200)="03", 0x7ffff000, 0x40080, 0x0, 0x1f4) pread64(0xffffffffffffffff, 0x0, 0x0, 0x1000) setrlimit(0xf, &(0x7f0000000080)={0x2a56, 0x5b1e982e}) socket(0x10, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(0xffffffffffffffff, 0xc040563d, &(0x7f0000000000)={0x1, 0x0, 0x101, 0xf, {0xfff, 0x2, 0xa1ea, 0x10000}}) 08:10:45 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 08:10:45 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000240), 0x2, 0x2) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000340)={0xb, @sliced}) 08:10:45 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000b0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:10:45 executing program 2: ioctl$SIOCX25SCALLUSERDATA(0xffffffffffffffff, 0x89e5, 0x0) syz_mount_image$omfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f00000001c0), 0x0, 0x6}], 0x1a3444, &(0x7f00000015c0)={[{}]}) openat$incfs(0xffffffffffffffff, &(0x7f0000001600)='.pending_reads\x00', 0x0, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000003480), 0x804140, 0x0) [ 2162.215189][T28872] usb 6-1: USB disconnect, device number 54 08:10:45 executing program 4: r0 = syz_usb_connect$printer(0x0, 0x36, &(0x7f0000000440)=ANY=[@ANYBLOB="1201000009000008250592d2070000000101090224ffff050074980904e4ff11070103000905010200ffe00000090582023a"], 0x0) syz_usb_control_io$printer(r0, 0x0, &(0x7f0000000400)={0x34, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x20, 0x0, 0x1}}) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) syz_usb_disconnect(0xffffffffffffffff) write$char_usb(r1, &(0x7f00000017c0)="83", 0x1) 08:10:45 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000480), 0x2, 0x2) ioctl$VIDIOC_QUERYBUF(r0, 0x5421, 0x0) 08:10:45 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x240080, 0x0) setsockopt$PNPIPE_HANDLE(r0, 0x113, 0x3, 0x0, 0x0) 08:10:45 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000003a40)={0x0, 0x0, 0x18}, 0x10) [ 2162.446428][T23986] loop3: detected capacity change from 0 to 386 [ 2162.592672][T23986] Currently only 4K block size supported! [ 2162.599789][T23986] Mount JFS Failure: -22 [ 2162.604300][T23986] jfs_mount failed w/return code = -22 08:10:46 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x66, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000040), 0x1, 0x2) vmsplice(r0, 0x0, 0x0, 0x0) [ 2162.699573][T23986] loop3: detected capacity change from 0 to 386 08:10:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_NEW_STATION(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000687532450000001300000008000300", @ANYRES32=r3, @ANYBLOB="240081000500020081000000050001000800000005000100dd00000005000100400000000400130006001200000000000a0006"], 0x68}}, 0x0) 08:10:46 executing program 1: pselect6(0x40, &(0x7f0000000180), 0x0, 0x0, &(0x7f0000000440)={0x77359400}, &(0x7f00000004c0)={&(0x7f0000000480)={[0x86]}, 0x8}) [ 2162.776891][T23986] Currently only 4K block size supported! [ 2162.902933][T23986] Mount JFS Failure: -22 [ 2162.948861][T23986] jfs_mount failed w/return code = -22 08:10:46 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000001000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) getuid() 08:10:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a0}}], 0x1, 0x0) 08:10:46 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='/dev/qrtr-tun\x00') 08:10:46 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000c0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) [ 2163.238550][T17413] usb 5-1: new high-speed USB device number 94 using dummy_hcd 08:10:46 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000140), 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) [ 2163.411140][T24022] loop3: detected capacity change from 0 to 386 [ 2163.508416][T17413] usb 5-1: Using ep0 maxpacket: 8 [ 2163.557934][T24022] Currently only 4K block size supported! [ 2163.567792][T24022] Mount JFS Failure: -22 [ 2163.575939][T24022] jfs_mount failed w/return code = -22 [ 2163.656689][T24022] loop3: detected capacity change from 0 to 386 [ 2163.689261][T17413] usb 5-1: config index 0 descriptor too short (expected 65316, got 36) [ 2163.708063][T24022] Currently only 4K block size supported! [ 2163.722792][T24022] Mount JFS Failure: -22 [ 2163.726999][T17413] usb 5-1: config 5 has too many interfaces: 255, using maximum allowed: 32 [ 2163.728086][T24022] jfs_mount failed w/return code = -22 [ 2163.823037][T17413] usb 5-1: config 5 has 1 interface, different from the descriptor's value: 255 [ 2163.931947][T17413] usb 5-1: config 5 has no interface number 0 [ 2163.961365][T17413] usb 5-1: config 5 interface 228 altsetting 255 endpoint 0x1 has invalid maxpacket 1792, setting to 1024 [ 2164.014906][T17413] usb 5-1: config 5 interface 228 altsetting 255 bulk endpoint 0x1 has invalid maxpacket 1024 [ 2164.038422][T17413] usb 5-1: config 5 interface 228 altsetting 255 bulk endpoint 0x82 has invalid maxpacket 58 [ 2164.059825][T17413] usb 5-1: config 5 interface 228 altsetting 255 has 2 endpoint descriptors, different from the interface descriptor's value: 17 [ 2164.111522][T17413] usb 5-1: config 5 interface 228 has no altsetting 0 [ 2164.228790][T17413] usb 5-1: New USB device found, idVendor=0525, idProduct=d292, bcdDevice= 0.07 [ 2164.243023][T17413] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 2164.262248][T17413] usb 5-1: SerialNumber: syz [ 2164.309853][T24008] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 2164.324699][T24008] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 2164.350016][T17413] hub 5-1:5.228: bad descriptor, ignoring hub [ 2164.372092][T17413] hub: probe of 5-1:5.228 failed with error -5 08:10:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)) 08:10:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000030c0)={'gretap0\x00', 0x0}) 08:10:47 executing program 5: socketpair(0x2, 0x1, 0x8, &(0x7f0000000100)) 08:10:47 executing program 2: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0200200001000100fbffffff001c08107f13", 0x12, 0x400}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000300)=ANY=[]) 08:10:47 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000002080)={0x0, 0x0, 0x0}, 0x0) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000002340)={&(0x7f0000002200), 0xc, &(0x7f0000002300)={&(0x7f0000002240)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 08:10:47 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000d0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) [ 2164.588284][T17413] usblp 5-1:5.228: usblp0: USB Bidirectional printer dev 94 if 228 alt 255 proto 3 vid 0x0525 pid 0xD292 [ 2164.669503][T17413] usb 5-1: USB disconnect, device number 94 08:10:48 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r0, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={0x0}}, 0x0) [ 2164.733954][T17413] usblp0: removed 08:10:48 executing program 0: setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000003c0)={0x0, {{0x2, 0x0, @private}}}, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 08:10:48 executing program 1: io_setup(0x1, &(0x7f00000000c0)=0x0) io_pgetevents(r0, 0x400, 0x0, 0x0, &(0x7f00000008c0)={0x77359400}, &(0x7f0000000940)={&(0x7f0000000900)={[0xa9ce]}, 0x8}) [ 2164.782842][T24060] loop3: detected capacity change from 0 to 386 08:10:48 executing program 4: pipe(&(0x7f0000000000)) msgsnd(0xffffffffffffffff, &(0x7f0000001240)={0x2, "eeae"}, 0xa, 0x800) 08:10:48 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@struct={0x3, 0x1, 0x0, 0xf, 0x0, 0x4, [{0xe, 0x3, 0x3}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/259, 0x35, 0x103, 0x8}, 0x20) 08:10:48 executing program 0: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_HANDLE(r0, 0x113, 0x3, 0x0, &(0x7f0000008500)) [ 2164.972590][T24060] Currently only 4K block size supported! [ 2165.019010][T24060] Mount JFS Failure: -22 08:10:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x13, 0xd9f, 0x0) socket$phonet(0x23, 0x2, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) preadv(r1, &(0x7f0000002540)=[{0x0}, {&(0x7f00000023c0)=""/8, 0x8}, {&(0x7f00000024c0)=""/77, 0x4d}], 0x3, 0x0, 0x0) [ 2165.048140][T24060] jfs_mount failed w/return code = -22 08:10:48 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, 0x0) 08:10:48 executing program 5: request_key(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0) 08:10:48 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ptrace$setregs(0xd, 0xffffffffffffffff, 0xfff, &(0x7f0000000000)="c0") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000200)=""/135, 0x0, 0x87, 0x8}, 0x84) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:10:48 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000240), 0x2, 0x2) ioctl$VIDIOC_G_STD(r0, 0x80085617, 0x0) [ 2165.175323][T24060] loop3: detected capacity change from 0 to 386 [ 2165.197577][T24060] Currently only 4K block size supported! [ 2165.205239][T24060] Mount JFS Failure: -22 [ 2165.209936][T24060] jfs_mount failed w/return code = -22 08:10:48 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000f0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:10:48 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0x12, 0xbc, 0x8, 0x101}, 0x40) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, 0x0, 0x0}, 0x20) 08:10:48 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, 0x0, 0x0) 08:10:48 executing program 2: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000600), 0x600880, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000640), r0) 08:10:48 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) 08:10:48 executing program 0: rseq(&(0x7f0000000080), 0x20, 0x0, 0x0) 08:10:48 executing program 2: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2165.611028][T24105] loop3: detected capacity change from 0 to 386 08:10:49 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) connect$netrom(r0, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast]}, 0x48) 08:10:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) fchmod(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) bind$can_j1939(0xffffffffffffffff, &(0x7f0000000000)={0x1d, 0x0, 0x2, {0x0, 0xff}}, 0x18) [ 2165.745198][T24105] Currently only 4K block size supported! [ 2165.796692][T24105] Mount JFS Failure: -22 [ 2165.830211][T24105] jfs_mount failed w/return code = -22 [ 2165.901224][T24105] loop3: detected capacity change from 0 to 386 [ 2165.917843][T24105] Currently only 4K block size supported! [ 2165.927064][T24105] Mount JFS Failure: -22 [ 2165.931941][T24105] jfs_mount failed w/return code = -22 08:10:49 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c40)={0x18, 0x2, &(0x7f0000001a40)=@raw=[@map_val], &(0x7f0000001a80)='GPL\x00', 0x87f0, 0xd5, &(0x7f0000001ac0)=""/213, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:10:49 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}}, 0x0) 08:10:49 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001040), 0x0, 0x0) accept$unix(r0, 0x0, 0x0) 08:10:49 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$sock_qrtr_TIOCINQ(r0, 0x541b, 0x0) 08:10:49 executing program 4: openat$cuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) 08:10:49 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000100c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:10:49 executing program 2: semtimedop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1, 0x0) 08:10:49 executing program 4: syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) syz_open_dev$dri(0x0, 0x0, 0x0) 08:10:49 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000002a40)={0x0, 0x0, &(0x7f0000002a00)={&(0x7f0000000380)={0xec4, 0x0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0xeb0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x44, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'l2tp\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}]}, @ETHTOOL_A_BITSET_VALUE={0xe66, 0x4, "7126990a03685db8364b02e930148b27a6e5634295722e2942f2654bdcbc984fa65d600b139e97a976901f881eddb778a19a3f083f04c9494a5bca7da61de0b808d121a135f064c432c7d48213a78530cda99422edc5d9a54ba9a299d768f27a35c13b39b29d771c689db64443f1a1204b61ba92ed74b4d46a2b0dbb6aef881c64101f1698185c7314f2ccd7347523ca70c853ec5873417790fdb6dac205886f8f65430c2c649641b3d209c9aabec3bfffca47ea171229932d183f88807fdea284b5142c488a6dd498b4c71e6f2410393b68b6c5498b9499f23fc2e5442937314eb4d86f5f3acad1f9069e7bb7154a28cc54788354af2728fdf64ae7a09fe7783090197dcb275e823902c8706fccc09cd6c03aee416f74e1c434da85d35ca08cfe021ed9f34e1b03ee7c77a134599e7e7dd47b482c5c951c5eebf66937cdbc0a1d880241d2609a69d633f6ec9e4b3126cdb16b03438bce00b73dc4eff7a37795f32f9a029be987d85a3a5ed42d3a21099880b316afbff99027c1c9056fae79086a4064a31034a4df1abe87bb5f46cc9f60d4cd9cad6f56b9b945764086a8dddc6ad885ccd99eba5ef4710ef250e45c9153245cc521681a660d300b205dd9e2f96dddf2a2b67e11bfba001cb8a562e8daf7cdeedc39449de5d4fdea880cca680d2c3eae2cb053b3d1b1f7fcf6ed9560ac88f24d9c703181327d6e2257ee40848b64b8da732b38d25d733bf580f26abbe58dd474c14fa6bd518d2c8fbfcb028754b1456d374c93023f4680bd4479466076167a5975fc91188344685afcbee7e69bd9d27e650ff1a5d03d273055ba6b9405b5ca19fd03975e9264698198064eeca24d66bb6e6ca144044cb927f50483ca1d7b57712f74ca13c9cbbf863a90c689c767f88bc6b547686f214749e8e327271ba3aa48a3a8d97dee3ae43b2ed840fed4708276038c123388808dc889e80cd9ab85fefa7291b2430507970ae65b425f91538f5e0e6399858304c4744f12fff92d5b2870e0176b537bebc8bb86a72e7f4ceb16e387f496b7b1d8a1d51ffd2f95d8d5802b069ff2ca43cf67d1bffb7604f012ccff7901067335048638cd16b2008455aba2f18654cbff75b2c376ffd10c409aa200bd4bbc7a5605544bffe4dc3cc2bd670ab6c3e12cf47f0866016db078ae2aeeeab8b0c6621189e2e411120810b3f05255d3153719a2c7880fd1f5a2e4c495cf48e525621a98952cdaf064c6ebc3638755fcdee0820838263ffa51a40fc9209930657e90cd01464261bb942f44079ce241b8224b63c75b18b080b6a03144a3a6eb1b044242532131d1da790a66cb85dc85b98e5b13ebc6447dbf2c5fa1cdda2001955c198b9e40666b38207c4cf81206a50dce5c2aad44cdcae4fd8b08646dc0cb8015bb4a6d3973831bcc74cddf21b9b291f64a5070f74ee15cc8db0bffb05a4d04a55a51beb4dd5a22a3580857146f9121e11b6d80650fa795a6f8ab6d61484e596f971486ff926a69d9e8ac030d897e3a02e8a24f54efdc57c94ce969006b93bb0a76b2deec7bfe5496ce5d00a1778a5aea32f8df80ac39d2529693746bcac5800ce7948cddbc08013bb08771980a90978ce3b3a7c524eca6f3eb1b9c08d0bea290e120c889f56bb841b11b26437a0f2cf79613116aa03f1fa37acb1dd91b4850a9c71ca0ef8c6d6aec4aa5e70ebca3eeb263d4a7bda3c9d72865acb431404af15ad35f5fa5ed398243f77d1c244c4f76606fe3565dc6a0fcfea944b3f09dcd5b5437cc4bf48eb6ad0b25a6ac0eb563745a93aa855275a15c5bcb483e6297bc3fa32ad3d0febfd8c968a18691feabcddeb6e8605955bec3b66503ea5be6727ef5bb679e7144da5fb995a0260795d22865c4c313ff4ebb1812975935971af11073d1b9997af02a0eda865e25bee92c7233aed4b98146be3afaca9bbe6fcca0f08b615d67fc66b87a5084521ae91f0ebb4bd5d7e70a3fa13308d248f1221399c7dc540639b8fc1023d0822fadd90313878183bdd59fd1eff7d969b96045152d32bff359a89df34fb25128b32dbb6f2fee5e88c36ae328ff5d620dd00f3bb757a2c951cdfc6ad398942d9e13280f3b873d29d1dddb9886e4e88b2753c09eb555b2cd062d712a99bf81342b43b1e1963156f0a7b8ff2764a40f6c4e3d694a52f9d068b69de7cbb7234f1a66c296ce1ae7514a9ab71599157c7f04290a6e61b1ff4029f84286a0bfc0f6e333b1fbfc618c804c51e514e33f0fbe5d449d0494c761523d210f304d72d2d6e58665385650cc8206bd212a91c9d286d6b5925dd6193631178dff926e5fa1e0de53d2f3d2de5ec2d2a7cedecd0c0d4e214930c07c316e682be3e95ee79caa0a0cf07f4cfeab92d3c9c4f7568ea8d968ed1d6c99ae4496ce91f7369cc11bd0438ea7c6ba02bca0881df1eb39284a2d2105e7bb27998535b0fb461c5048a0310099139441a84648ef2eac0474c18ec03e8719baaf31e0f929ce0af1a6658df19d293d42790418c582a9641a3fdccbd8df24aff6608afcde8200b8c358efb4d10ffbb6f4257806f6e883cc8b44a46f81fb78801376c80f65d8ab1ef916bb874efec2fca62793ae0075a099db98e46660bcf58d7865ec9a2fe8d5841d310871f6bcca82eb4912492bd5acd0cb9582c2132e31b0cfa39aee0d0b263091f12950a19cef783c235b81e715e800ee59e82d235745e23d2dd9455c537d39464023a76cc7e3c16f37564e59d42deef7e9aca2b5bda265251666efbc05a5835e7147b9b7b3ef4b432b82dab7c97c65b1b8e27f56ca0d29653686a3ad2be97a59e8a0e1c47da55802a547a8418185d22d2790e9d339d3e104b755410d244335e6bd70d2b291c1b7c693b344677bac8ce090775485ca06e39e878e324b8475030cb7322b7d2a07d7ddb2d0b9eb3d0ac322a681ee11341ccbc630dccfa8bf3950c8f5183d03af9a8ca823b14f4d8eaa88fa919d9f6fda2516bd45dde960ce7cce0a0531a3e894e8383e59fb1df11f8f8d834595ad80620b07ec359c0c1a948b4ab7974da6122e95f3479dbe823f57a6de462a06a5d0a5c5fae79ed45bc1110d2a868e18a924068bf6dd3a8f66c6a9a5624d2a803266c90b81c603ffb7a196f53c1f445b7e799b44079e7c673272c2c3c6aeef3a193f8e6981a91945b90bcf577cf81f17835f341ee01c3814e5657fd3b85926f5ae2fe5c7d6197fd6b5106d656e3015c43af3df29532d0363e715d7e93a8b7465493a9faf2d5074d84913f873e328a1ac47981371cc9da0442ebb6876613d3501604c8312c3fe7637066ae68327136a46b2efaa48b10d6e7624bfd66b3ec58984d87b8bc8543cda03ab781b999b2e5f1f8e3c9917678fc25da26b0a32970de6d00a830c44df99c955daa0f1d852e672f967bc7c19ff2c643c93f49e60178e5c06cea28aaea86910ac235aeb769ff501b155a493a26c217b4cd5d162aae8c26bf578661994045bc9d4bf4e9b2ec294559b76ef304bf7cbd94d2b8d4d67c0d2a2076fadaa4c13ab396a743e99f354b8d740dbb52f06a6a4059a2ccef4cf45d5e14c3bdba5175b0ef67d7139e2b819f97dce617513a7360e6fcd2f893d5b5c57ddb77af796454e6993f31fecba5b47acd22d1dfd2aebf259d34e9012905e249b0b210212a63cd7022443f15aa4e3d049dd16c6def2dc1468451f7988efb8b14fa35419ecc38c4c6863af8448020c51fb365c366a3c438fe7ef1e6b2625a8792ca6b3a459437cb5ef1ef5a826e00d3f4f40114e348ae3219169834117abb5faf968610b9bd947df300934e5522eef290da699097e3c1657cc1b5ff9b20574703192a12130c9a960b1fe64aca44e31b5edf40fdd0d4e51d35d57e7c5dede28b20829031cd9fa38372c67e568bf18971e571f49199e429e94b169bbaacce477397ebf7d11817b29ee4479605c3edc1e56d3ee8a7042679bf4959d5c431bdf45064379af352a81946e3a0d276ec67e797ba1b35b31153c9de3cad0c665e2af810a37e7ec6dab67ab940c9e8c5a5f690d5744b38f80373086580f170aa9712e5c3cf63f8b46aba5c8f5933ffb2fe6ed5ee9c613de48f91516b950cc4ac55b323d97c6618096d6196a9403c03832649a09d01bd9ee4cb7cb0f1956334db0109d414a7451a05ed1464ee298c970ed279ad3c9653f1b50b6e38a554ea62df3bcbe6cb5b3917f149547905231d0c6d8154ca0a3cf5121deba473139220ea0cfb6d6e53e9bbefe92ea512dea9db33288b7b6310f250191bf98f2fa659c69fada072030267a5eeeeba44ceb08a45d8d169642846c3b301522a424e84a69904f31bfe9c4e1c1c967f08ad66bf7be6a5cabdf49a1da5cdff09f65767860478839b4bc2d3f4c1da92309db624f481c354505ffd5043ae278c2a19db10d5099a6ca5b4e2eaee33891ee6b264e8c944e8d89438b294755b9c5a0005953dcd664616e846c414ab6c67e8dd6de3e647f4d43eb3780b779ea6af47e7dc1c10bc36752504bc2c2bea4dc3cdb00f2f3a2123d9925a854f36d8b288a177f50ae5bb728b742f8dde04b226cb95907134230f3b8fd2a76f6c81068eb0fc8e951d8d67841503bedfebdc5cd4983f57a2136fd205817b7c7afc415347fac0c321dce73bf5420f449346cb12a77860c2d99e0d22b6ed14e4d08f64a3dcd14686c27bba3b82303573f1b0ab2b6fedd5245eb4e849949cd3df380f09eb2d5d1a7753fdbaac94fa6303b8a07fbaa045ffcca9a9eaea5c72df0f8cd544c976b67c2c14b79f600b2d8e011ea760f82fa5f89441dc6a051cafa0309376d8582d1c20230d2c1432232abd0a422d12f8bcf69facb81eec116e48ccf3503e6bdeb6922afa3127b222f5013a9cee702c1b1d1566229e56c561861f4adafb5cf1903586bbd1331784cb22a474296d6b13064cab4d0c32419a3eff623e628e53bc912354b02531c29fb81c003c386a8345fd7c96ba69e02bc6dd9397a82a087078ee1a637cfad4631505454a5c8c764f10f8986200ade796cb00c88c50e1be40735176a92d6c210233620d19bc50a0b75abfdce4c28fdb3b80ed588eadc6d8cbcae810720bb0d8d1d87a6a8e99df4ca652f3970d46491c76dc6477c812ee7f2bb1720ab951e95bc95034a0ec207f819fd7ac7f55a52670d37829a5e3fef76536fe34bb30f822e68051109e2192bc2f2fc4e474c39b28c073eb9028c8f57afee"}]}]}, 0xec4}, 0x1, 0x0, 0x0, 0x11}, 0x24000880) [ 2166.307025][T24137] loop3: detected capacity change from 0 to 386 08:10:49 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x5, 0xffffffffffffffff, 0x0) [ 2166.357618][T24137] Currently only 4K block size supported! 08:10:49 executing program 5: syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000300), 0xffff, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000340)={0x0, 0xb, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a230786a"}, 0x0, 0x0, @userptr}) [ 2166.414185][T24137] Mount JFS Failure: -22 [ 2166.423470][T24137] jfs_mount failed w/return code = -22 08:10:49 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00'}) [ 2166.474334][T24137] loop3: detected capacity change from 0 to 386 [ 2166.485182][T24137] Currently only 4K block size supported! [ 2166.494838][T24137] Mount JFS Failure: -22 [ 2166.500254][T24137] jfs_mount failed w/return code = -22 08:10:49 executing program 2: r0 = syz_open_dev$vim2m(&(0x7f0000000180), 0x0, 0x2) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000280)={0x0, 0x2, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "61cd67b1"}}) 08:10:49 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000110c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:10:49 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) read(r0, &(0x7f0000000400)=""/269, 0x10d) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) ioctl$TCXONC(r2, 0x540a, 0x3) 08:10:49 executing program 0: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000c40)) 08:10:50 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000240), 0x1, 0x2) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x0, 0x1, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "1d62e5cb"}, 0x0, 0x0, @fd}) 08:10:50 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f00000002c0)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000300)={r2}, 0xc) 08:10:50 executing program 2: syz_open_dev$audion(0x0, 0x0, 0x0) r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000002600)={0x0, @qipcrtr, @ethernet={0x0, @multicast}, @nl=@proc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x899}) [ 2166.870095][T24166] loop3: detected capacity change from 0 to 386 08:10:50 executing program 0: socket(0x22, 0x0, 0x1004) 08:10:50 executing program 2: r0 = syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200020000100010005000000001c08107f13", 0x12, 0x400}, {&(0x7f0000010100)="ff000000feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff03f0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed415cf970000000e7c2645f530305", 0x80f, 0x800}, {&(0x7f0000010a00)="01002e0000000000000000000000000001002e2e000000000000000000000000020066696c6530", 0x27, 0x1400}], 0x0, &(0x7f0000000300)=ANY=[]) r1 = dup2(r0, r0) utimensat(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 08:10:50 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000004300), 0x208c2, 0x0) [ 2167.068658][T24166] Currently only 4K block size supported! [ 2167.082041][T24166] Mount JFS Failure: -22 [ 2167.100314][T24166] jfs_mount failed w/return code = -22 08:10:50 executing program 1: syz_io_uring_complete(0x0) syz_open_dev$ndb(&(0x7f0000002bc0), 0x0, 0x2001) 08:10:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 08:10:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[], 0x2c}}, 0x0) [ 2167.167047][T24166] loop3: detected capacity change from 0 to 386 [ 2167.188394][T24166] Currently only 4K block size supported! 08:10:50 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000230c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) [ 2167.250573][T24166] Mount JFS Failure: -22 [ 2167.255422][T24166] jfs_mount failed w/return code = -22 08:10:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000100)={@loopback, @private, @private}, 0xc) 08:10:50 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000840), 0x141481, 0x0) 08:10:50 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000100)={'ip6tnl0\x00', 0x0}) 08:10:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000023c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:10:50 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETGAMMA(r0, 0x40305828, 0x0) 08:10:51 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) lseek(r1, 0x4200, 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) preadv(r0, &(0x7f0000000000)=[{&(0x7f00000002c0)=""/190, 0xbe}], 0x1, 0x0, 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) sendfile(r0, r0, &(0x7f0000000100), 0x8080ffffff7e) [ 2167.718658][T24201] loop3: detected capacity change from 0 to 386 08:10:51 executing program 2: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f0000000b00), 0x0, &(0x7f0000000bc0)={[{@shortname_lower}]}) [ 2167.772241][T24201] Currently only 4K block size supported! [ 2167.778648][T24201] Mount JFS Failure: -22 [ 2167.783087][T24201] jfs_mount failed w/return code = -22 [ 2167.818419][T24201] loop3: detected capacity change from 0 to 386 [ 2167.831799][T24201] Currently only 4K block size supported! [ 2167.846217][T24201] Mount JFS Failure: -22 [ 2167.869186][T24201] jfs_mount failed w/return code = -22 08:10:51 executing program 4: syz_mount_image$fuse(&(0x7f0000002240), &(0x7f0000002280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000022c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}}) syz_mount_image$pvfs2(0x0, &(0x7f0000002480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:10:51 executing program 1: wait4(0x0, 0x0, 0x0, &(0x7f0000000080)) 08:10:51 executing program 5: r0 = epoll_create(0x4) epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040)={[0x5]}, 0x8) 08:10:51 executing program 2: pselect6(0x40, &(0x7f0000000500), 0x0, &(0x7f0000000580)={0x3}, &(0x7f00000005c0)={0x0, 0x3938700}, 0x0) 08:10:51 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000480c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:10:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20}, {0x6}]}, 0x10) 08:10:51 executing program 1: r0 = syz_open_dev$swradio(&(0x7f00000001c0), 0x1, 0x2) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000300)={0x0, 0x9, 0x4, 0x0, 0x0, {0x0, 0xea60}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "cf56f747"}}) 08:10:51 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000240), 0x1, 0x2) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000140)={0x0, 0x8, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "016a54aa"}, 0x0, 0x0, @userptr}) [ 2168.190519][T24225] fuse: Bad value for 'fd' 08:10:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x78, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_FRAME={0x59, 0x33, @beacon={@with_ht={{{}, {}, @broadcast, @device_b}}, 0x0, @random, 0x0, @val={0x0, 0x6, @default_ap_ssid}, @val={0x1, 0x1, [{0x0, 0x1}]}, @val={0x3, 0x1}, @val={0x4, 0x6}, @val={0x6, 0x2}, @val={0x5, 0x3}, @val={0x25, 0x3}, @val={0x2a, 0x1}, @val={0x3c, 0x4}, @void, @void, @void, @void}}]}, 0x78}}, 0x0) 08:10:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000340)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f00000000c0)={[{@compress_force}, {@compress_force_algo={'compress-force', 0x3d, 'lzo'}}]}) [ 2168.334137][T24232] loop3: detected capacity change from 0 to 386 08:10:51 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f00000001c0)={0x0, 0x0, 0x3f}) 08:10:51 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000c00), 0x0, 0x0) [ 2168.474595][T24232] Currently only 4K block size supported! [ 2168.545255][T24232] Mount JFS Failure: -22 08:10:51 executing program 4: syz_mount_image$efs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f00000015c0)=[{0x0}], 0x0, &(0x7f0000001680)) 08:10:51 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) [ 2168.576526][T24232] jfs_mount failed w/return code = -22 [ 2168.672139][T24232] loop3: detected capacity change from 0 to 386 [ 2168.699596][T24232] Currently only 4K block size supported! [ 2168.754868][T24232] Mount JFS Failure: -22 [ 2168.802734][T24232] jfs_mount failed w/return code = -22 08:10:52 executing program 5: rt_sigprocmask(0x0, &(0x7f0000000a80), 0x0, 0x8) 08:10:52 executing program 2: exit(0x0) syz_usb_connect(0x0, 0x3f, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000c015e810da059a007bca0000000109022d00810000000009040000038c88740009058d020000000002090501eac28254000009058f82"], 0x0) 08:10:52 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) r1 = memfd_create(&(0x7f00000002c0)='#\'%nod%v\x00\x7f\xe5\xd0ql\x86\xc9\xe6\x14\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x00\x14}\n\x81\xc7\x85|oC\xca\v\xe3\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xab\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF\x13\x9f\xc2\xb7/1\xb9V\xf0*\xcb\xdc\x05n<\xcfi\x02=1\xda\"\xb3\xfe\xf3\x97\xd9\xa5b\xd4\x00Q$\xb2v\\\xa9\xcf*tw\x8a\n_)\x89A\x8f`R\x12zM\a\xc43\xd0d\xee\x13Q', 0x0) write(r1, &(0x7f0000002000)='/', 0x1) sendfile(r1, r1, &(0x7f0000000200), 0x87) sendfile(r1, r1, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x11, r1, 0x0) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x8) r2 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$bt_hci(r2, 0x84, 0x70, &(0x7f0000001080)=""/4080, &(0x7f0000000080)=0xff0) 08:10:52 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x0, &(0x7f0000000080)) 08:10:52 executing program 4: syz_mount_image$efs(0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0), 0x0, 0x0) 08:10:52 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010004c0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:10:52 executing program 1: r0 = syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200020000100010005000000001c08107f13", 0x12, 0x400}, {&(0x7f0000010100)="ff000000feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff03f0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed415cf970000000e7c2645f5303", 0x80e, 0x800}, {0x0, 0x0, 0x1400}], 0x0, &(0x7f0000000300)=ANY=[]) r1 = dup2(r0, r0) mkdirat(r1, &(0x7f0000000180)='./file0\x00', 0x0) 08:10:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000180)={&(0x7f0000000040), 0x18, &(0x7f00000000c0)={&(0x7f0000000000), 0xffef}}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) fchmod(r3, 0x32) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private1}}, &(0x7f0000000580)=0xe8) sendmsg$can_j1939(r0, &(0x7f0000000680)={&(0x7f00000005c0)={0x1d, r4, 0x1, {}, 0xff}, 0x18, &(0x7f0000000640)={0x0}}, 0x4020000) 08:10:52 executing program 4: keyctl$dh_compute(0x17, &(0x7f0000000000), &(0x7f0000000040)=""/51, 0x33, 0x0) [ 2169.537749][T24273] loop3: detected capacity change from 0 to 386 [ 2169.641413][T24273] Currently only 4K block size supported! [ 2169.706878][T24273] Mount JFS Failure: -22 08:10:53 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000480), 0x2, 0x2) ioctl$VIDIOC_QUERYBUF(r0, 0x5450, 0x0) [ 2169.768690][T24273] jfs_mount failed w/return code = -22 [ 2169.798350][T17413] usb 3-1: new high-speed USB device number 52 using dummy_hcd [ 2169.840321][T24288] loop1: detected capacity change from 0 to 20 08:10:53 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000200)=@req3, 0x1c) 08:10:53 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000180), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000000)={0x5, 0xc, 0x40081, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0xc00c642d, &(0x7f0000000100)={r1}) socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r3 = syz_open_dev$swradio(&(0x7f0000000100), 0x0, 0x2) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000740)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) fanotify_init(0x0, 0x0) clock_gettime(0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) [ 2169.928698][T24273] loop3: detected capacity change from 0 to 386 [ 2169.958088][T24288] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 2169.966934][T24273] Currently only 4K block size supported! 08:10:53 executing program 4: io_getevents(0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}) [ 2170.013665][T24273] Mount JFS Failure: -22 [ 2170.059262][T24273] jfs_mount failed w/return code = -22 [ 2170.079329][T17413] usb 3-1: Using ep0 maxpacket: 16 [ 2170.231129][T17413] usb 3-1: config 0 has too many interfaces: 129, using maximum allowed: 32 [ 2170.251672][T17413] usb 3-1: config 0 has 1 interface, different from the descriptor's value: 129 [ 2170.308948][T17413] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x8D has invalid wMaxPacketSize 0 [ 2170.352814][T17413] usb 3-1: config 0 interface 0 altsetting 0 bulk endpoint 0x8D has invalid maxpacket 0 [ 2170.390722][T17413] usb 3-1: config 0 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 706 [ 2170.417007][T17413] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 2170.442118][T17413] usb 3-1: config 0 interface 0 altsetting 0 bulk endpoint 0x8F has invalid maxpacket 0 [ 2170.467348][T17413] usb 3-1: New USB device found, idVendor=05da, idProduct=009a, bcdDevice=ca.7b [ 2170.491433][T17413] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2170.523215][T17413] usb 3-1: config 0 descriptor?? [ 2170.555270][T24274] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 2170.622923][T17413] microtek usb (rev 0.4.3): will this work? Response EP is not usually 13 [ 2170.658601][T17413] microtek usb (rev 0.4.3): will this work? Image data EP is not usually 15 [ 2170.701720][T17413] scsi host1: microtekX6 08:10:54 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000080)=""/259, 0x1a, 0x103, 0x8}, 0x20) 08:10:54 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f00000000c0), 0x0, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000100)={0x40000000, 0x0, "44a2b1d40279fc38585d63370affe578dd8f96de739dd6945ae8e9363d1a9cd8"}) 08:10:54 executing program 4: set_mempolicy(0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"/607], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 08:10:54 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000600c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:10:54 executing program 0: fspick(0xffffffffffffff9c, &(0x7f0000000780)='./file0\x00', 0x0) [ 2170.810040][T20602] usb 3-1: USB disconnect, device number 52 [ 2170.838398][ T3355] microtek usb (rev 0.4.3): error -19 submitting URB [ 2170.878480][ T3355] microtek usb (rev 0.4.3): error -19 submitting URB [ 2170.953077][T24322] loop3: detected capacity change from 0 to 386 [ 2170.985631][T24322] Currently only 4K block size supported! [ 2170.995410][T24322] Mount JFS Failure: -22 08:10:54 executing program 5: recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)=@abs, 0x6e) fork() [ 2171.001655][T24322] jfs_mount failed w/return code = -22 08:10:54 executing program 2: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x40010, r0, 0x8000000) [ 2171.087179][T24322] loop3: detected capacity change from 0 to 386 08:10:54 executing program 5: timer_create(0x0, &(0x7f0000000440)={0x0, 0x12}, &(0x7f0000000180)) r0 = syz_open_dev$usbmon(&(0x7f0000000040), 0x0, 0x0) r1 = getpid() ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000000c0)={0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f0000000100)={0x0, 0x0}) tkill(r1, 0x800000015) [ 2171.168144][T24322] Currently only 4K block size supported! 08:10:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname(r0, &(0x7f0000007180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, &(0x7f0000007200)=0x80) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(r1, 0x0, 0x0) 08:10:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x7) sendto$inet(r1, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) shutdown(0xffffffffffffffff, 0x0) 08:10:54 executing program 0: socket$caif_stream(0x25, 0x1, 0x1) [ 2171.217034][T24322] Mount JFS Failure: -22 [ 2171.222787][T24322] jfs_mount failed w/return code = -22 08:10:54 executing program 2: r0 = perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x0, 0x6, &(0x7f0000000580)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @map={0x18, 0x5}, @alu={0x4, 0x0, 0x7, 0x8, 0xa, 0x0, 0xfffffffffffffff0}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}], &(0x7f0000000800)='GPL\x00', 0x1, 0xdf, &(0x7f0000000600)=""/223, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000740)={0x5, 0x6, 0xf3a, 0xffff}, 0x10}, 0x78) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r1 = dup(r0) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000140)=""/93) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000100)={0x2, 0x0, 0x3}) statfs(&(0x7f0000000040)='./file1\x00', 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000003b00)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000003ac0)={&(0x7f0000000400)=ANY=[@ANYBLOB="f4000000eb359595fba7f73cd7bf40cee0fd5aa42ad9f3112aaea80c71127c1ab9f173ebf919c96ff93464fe23302842984690ce927cc28a9e5b05688c62d6d79fa99a925a7d279073374b749feb9aa45edcfc209a0000bb4590236c94561aa826eb23f57ed3d11505000000cad8fb1bb5caf1", @ANYRES16=0x0, @ANYBLOB="020025bd7000fddbdf2503000000050005007f000000540001800800", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="600194cfd1493808000000", @ANYRES32=0x0, @ANYBLOB="0800030003000000140002007866726d3000", @ANYRES32=0x0, @ANYBLOB="14000200776c616e30000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="140002006772657461703000000000000000000048000180140002006272696467655f736c6176655f31000008000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f3100001400020074756e6c3000"/40], 0xf4}, 0x1, 0x0, 0x0, 0x40043}, 0x4000840) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, 0x0, &(0x7f00000001c0)='./file1\x00', 0xffffffffffffffff) fchdir(r2) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f00000003c0)=ANY=[], 0x9) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) 08:10:54 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000480)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) chdir(&(0x7f00000001c0)='./bus\x00') open(&(0x7f0000000000)='./bus/file0\x00', 0x0, 0x0) 08:10:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x14, r1, 0x1, 0x0, 0x0, {0x10}}, 0x14}}, 0x0) 08:10:54 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000680c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:10:54 executing program 1: bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000800)={0xaf}, 0x8) pkey_alloc(0x0, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000900)={{0x12, 0x1, 0x0, 0xe7, 0xf, 0xe8, 0x8, 0x1645, 0x7, 0x10f, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x6, 0x0, 0x0, [{{0x9, 0x4, 0xa6, 0x0, 0x1, 0x39, 0x21, 0x4f, 0x0, [@hid_hid={0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0xe8f}}], [{{0x9, 0x5, 0x0, 0x0, 0x10, 0x0, 0x7}}]}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000001480)={0x84, &(0x7f0000001040)={0x40}, &(0x7f00000010c0)={0x0, 0xa, 0x1}, &(0x7f0000001100)={0x0, 0x8, 0x1}, 0x0, &(0x7f0000001180)={0x20, 0x0, 0x8, {0x1000, 0x0, [0xf000]}}, &(0x7f00000011c0)={0x40, 0x7, 0x2}, &(0x7f0000001200)={0x40, 0x9, 0x1, 0x7f}, 0x0, 0x0, &(0x7f00000012c0)={0x40, 0x13, 0x6, @local}, &(0x7f0000001300)={0x40, 0x17, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, &(0x7f0000001340)={0x40, 0x19, 0x2, '.}'}, 0x0, &(0x7f00000013c0)={0x40, 0x1c, 0x1, 0x4}, &(0x7f0000001400)={0x40, 0x1e, 0x1, 0x5}, &(0x7f0000001440)={0x40, 0x21, 0x1}}) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000001600)={0x1, 0x3}, 0x2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003a00)={&(0x7f0000001680)=@l2tp={0x2, 0x0, @empty, 0x2}, 0x80, &(0x7f00000038c0)=[{0x0}, {&(0x7f00000027c0)="0cb170e5eb13de65ad5df42d00b235bde3bfed973b536f51c561e3aa23546604d0a1bbc4e792d6d74096fae7e9a8bcff657ab64267f79576944a132010cb525b6df3855e8ce35819fe9cc76c45bd6f4cdf393f9baec360495ab05f25092514ae676b487375a4f54e93781d3fad64c01a01460a7f57791bd651a798c187d7069a55e03147f415133f7c017cee1c2637c98a59fa3fff298d49b351b3b92d52c0bf71b3d403338e26ae112c43c7919726cfe62567f84d83d7a7bb1a65490f3aabf6390cedd98aad0b5286c6bb6536d4547197028d06595c", 0xd6}], 0x2}, 0x0) r1 = socket(0x1f, 0x0, 0x3d6e3ed1) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000003a40), 0x4) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000003a80)='cgroup.procs\x00', 0x2, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANE(0xffffffffffffffff, 0xc02064b6, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000003c80)={r1}) 08:10:54 executing program 4: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, &(0x7f0000010d00)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000180)='./file0\x00', 0x4b642, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$9p_unix(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0), 0x91, &(0x7f0000000700)={'trans=unix,', {[{@debug}, {@version_u}]}}) unlink(&(0x7f00000000c0)='./file0\x00') write$9p(r0, 0x0, 0x0) 08:10:54 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001f80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffffd0}, 0x48) r1 = open(0x0, 0x0, 0x0) socket$phonet(0x23, 0x2, 0x1) fchdir(0xffffffffffffffff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000480)={r1, 0x0, 0x96, 0x1c, &(0x7f0000001e40)="80488cc0791b25e88678ce3a27eed30ad2faa92c503cf5b67fbd64ebbcc914d39ad7ac62c24be923cfcf569a871e729b0b826fa0580eca8fe1e7345039cd203ad941f0efb74d21c360156a05549934dad2c87f8a26a2888c05027352b323655bf5d4d8f0db6daaf33c2fe77594570e98f0cbcfed714f299180983b07015effe3b846d06756d5912151fe6e82b95b03fb4c6f9c6bd180", &(0x7f00000001c0)=""/28, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x10, 0xfffffffffffffe8d, &(0x7f0000000500)="b9ff0300600d698cb89e14f043051fffffff00074000632f77fb0514140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x200, 0x60000000, 0xb20c, 0xfffffffffffffe09, &(0x7f0000000040)="3f58266c799726865bf7830e3773dce9aa7e76becc18910b7b50b80dbed5f757c2a04467671d72f716595ff422e71a25d906dcc8c7007c0605a0ffffffff"}, 0x28) 08:10:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket(0x3, 0x0, 0x0) 08:10:55 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$rose(r0, 0x104, 0x1, 0x0, &(0x7f0000000280)) 08:10:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@raw={'raw\x00', 0x3c1, 0x3, 0x388, 0x158, 0x150, 0x150, 0x158, 0x0, 0x2b8, 0x238, 0x238, 0x2b8, 0x238, 0x3, 0x0, {[{{@uncond, 0x0, 0xf8, 0x158, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}, {0x68}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}, {{@uncond, 0x0, 0xf8, 0x160, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@mh={{0x28}, {'p4'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz1\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e8) 08:10:55 executing program 4: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$sock_int(r0, 0xffff, 0x20, &(0x7f0000000040)=0x80, 0x4) [ 2171.938596][T20602] usb 2-1: new full-speed USB device number 74 using dummy_hcd 08:10:55 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$sock_int(r0, 0xffff, 0x0, 0x0, 0x0) 08:10:55 executing program 0: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0x0, 0x0, 0xffffffffffffffff}}) [ 2172.094711][T24385] loop3: detected capacity change from 0 to 386 [ 2172.189239][T24385] Currently only 4K block size supported! 08:10:55 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r1) sendmsg$unix(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@cred], 0x20}, 0x0) 08:10:55 executing program 4: r0 = socket(0x18, 0x3, 0x0) sendmsg(r0, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[{0x808, 0x0, 0x0, "d7af69a2e988b03cbad9f7a39ddfbd9a481cdce1e26e0172087b5ed0b2b4fe5dde697bd78402fbeb4856654ea09fd6b5045d41e02b59d979f42c303a9da681e2a35ba32527b7cba27a2fe57b0c76c7a54a352d81ef709ace94e5646b9693cdadffe1ee06c9187da7671624c909e1aacab47c5a8305153795f322855c5dfb71b14ab96ea94f696bd542557aaebb82cad4b32f693fbd66359cb6c3fd55cba38311d733c9ca150eb63e0fafafb84c5d7c8f4a2b07e8dd03b2e87f2eb3f4592a837369dce722c86db6cd3253291b5ab03a8973ef98af8b962245bd48e0bd5087cc20e4198c4646659eb4138bcb26440d99cac9183aa085417bd5a14a899460954fa7684fee7c0f253ea05b3359f8cc10d114116ef508064c730c696c60410a27c4b8540f0653765f651daf4bcf87d07145a1159c7fb2eeafbf90817caecfd23415bc57e4d64689d61a21e3853e522011a0ab9bc96a6c4a25dda0eb562144528400bf74c166ccb4106e38581822c07a6e88b9a7f14d8bad2ec486548ff4cfd3065d88509d1fc14441da0ff8330717d7442d300bafe0c71437c6da5118facc3376b6d93ca6efa2367c7ac5347c9782f2d7406d4c04179612d9003b0a06d1b7704c71609849a1291a04d1cdc59d8dbc42923938679c0132f24c3e0cbf9d920bdf39e5e674e5aa4d60f55632dadeb8a1b740661c4023897f3a7c57c4270844a8f918a9dc25d76b4a0fd4f1dd6d2b5ff5c304f9785edf8a89a404e3e8b27d8663778299c5c86b829dd9c8e29b07c33a3c5c9f3aa33ae65ead88757007d8364c8cad41bde44e79a14700711a398214c74dca5708e6909a4141bc86db4cbeb1502fb8e5b6785a056b53f5fa62977ae3f9be23101f48db51a3493ab58377b3b7e8d57578cb672323c9d28ea9190dddb9de946fa9bc62e5927e4a1b1ebace3c296da5be5827d18cafd4077fe0da400a36930743fb1c010f6a28de13d04b0fab98e72d16bf84404f3a0be1af908168512ecfdb981a1625ddf2cda63f5299c5f04bf9eab7b34484f1d646519b5e218062394c4d8daa0d9815de2567b396910df5d83384443a523e5009ee9e8df1bb6774d6c1910576a7f3072cc0494dc2bd710b201fb91f46786254460252f75ad2153bdc98e014b20b0cb4601a0d33fb0da0e4e8808ac428c01fbdc62ca413262a8393a35c9199460b86fd881926887c47bc830ba827e31aff71367e165166fb27367f18a91d4089f9c8e64f0e729f6807cc04db2504e5e8c87458e1a41aa8a0d332c2823eb847ba19e103a3d5b7824d3a9a898c88b0c985651447bbd8072135409e547b7b8db65e03c39af61c1f2d5c81c6972b7be68c43ba91c37636dcef8109a327cd59619c9e792c329cc5b8107416d5f845fea2e2f6a267c2fdb412e81a6291f8f763d12fe5e35034d29d5b88613972985d067fc34383493e04815be32e5cc68a8c5a255b85a89e4368a001788e2cc66d458e31de76d73f3da856db4d1f90820e98dc624c597fdfff5678f49f356792b3cde87819f99880f15ead7b028a2ee77e9c8938cb2a450043464567216aeb518cd74c56a94323315e68d328fb7a59b4e7e3016c2bdd925d51c008ba5649e4dab4067b219fd94ec23369ece73a81040f8f3f1781a4208c025ab68f2d8f19a8ab680e0fecfa049f685aa4ead5299d86bcaf50da5308d26bf6ae89fd958efc82fe4fa5ab34736dd75ec80649111990f4fca990e99ff6ab8c95e266bf719272f8bd5a0fa3cfd968059d4ffb6f54622981f48fd6da6e4c9e5987f94048d030a3e99ebb659d212a56b670ff09d91c3b63a243a92c644a7ae04593b467e3942c2f3d075f71ba70e5e0c6f7d94e494f91f9f67df43c20274bf49cb5320a4f952de7e480cd0883931590de71b545a71352c0b6c9cb001a75222791ae5f16c66111949823bfb220ce731d69960a32e5d358dcd15f284d6952cd51362a5e1fb221ebb8ec65d4079d20b2a43fe7a35313ff15285f1fb74ce78fd4abe503234d7620e34821e8f710c9dbaa643f49c8875ba253ba9d3b4fc5a0a932068b9cf173cb735170590ac85778bd6e0743a275c5da6391b5330116f9c3ebbd6d35beadd679e97a215cf9d7ce95cf87be1fe5778780681265a5ba4099c8ea8af34a084024b3f1a29cc40b801887a3f3b2b3a043d248690571413e1a37f353802d1951661c280779bc29396e2512f08e35710809eb43d31635d264d5b9d3570f5f0cf8949f065ac3a8ceefc3f3df031ded5c5fb2e61c37b08f79dd7831dab378f9e0124353a130758c334e27d280deb9a671cfb3e071aa8f6d5b22b01ad87c541bbbacfeaa335d6184a23fa4b67f47c9a59073d3b5faff407b3bfafdb069e97a32833f3d1b48b2357dba13ed9fc401886c2cd762d1c979ab112fa08581489406f064828f0eee7c0d3f0c29129b1c49ec5537ea05c49cc6edab2541edc9c4a39a006595627d8030ad758fe707921b63c40c2f69279abeb46a7f30eb38ee5039f013c0799c06b41081ba110dc94f85c2ef295ba4ad2bfadd8e2859735b5a6b8f755fa861294068d666886f91e3c56b67c0578be258b02d42976db8d3ca58c5089c1aca536fc95cd6460ef32d747888acbf14fc5bf403f36883459d5ec59d612ba1777555a0fab64dda992e3442155204092e69e01b1d6fdc9418cfdd7b8b1cfabffe39253697759ed9cd75ba946a8bbe5c1a1395fa47f9c5575802977bc5ddca3b655ac37e224a27e725fb090381437f7a58a43985e52f9b72eb4686140814e7281a1b8bed2832db0d4335ef52a54fbbb270866eb475e14659df9e34777cede99b23809609b7e5877fd910f9488aea7747dae709e9757d95590c944633ee22ef0faa1053b7"}], 0x808}, 0x0) [ 2172.234813][T24385] Mount JFS Failure: -22 [ 2172.242313][T24385] jfs_mount failed w/return code = -22 [ 2172.309505][T20602] usb 2-1: config 0 has an invalid interface number: 166 but max is 0 [ 2172.315017][T24385] loop3: detected capacity change from 0 to 386 [ 2172.319712][T20602] usb 2-1: config 0 has no interface number 0 [ 2172.371934][T24385] Currently only 4K block size supported! [ 2172.377760][T24385] Mount JFS Failure: -22 [ 2172.385707][T24385] jfs_mount failed w/return code = -22 [ 2172.452836][T20602] usb 2-1: config 0 interface 166 altsetting 0 has an invalid endpoint with address 0x0, skipping 08:10:55 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010006c0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) [ 2172.698931][T20602] usb 2-1: New USB device found, idVendor=1645, idProduct=0007, bcdDevice= 1.0f [ 2172.714761][T20602] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2172.741428][T20602] usb 2-1: Product: syz [ 2172.756167][T20602] usb 2-1: Manufacturer: syz [ 2172.772852][T20602] usb 2-1: SerialNumber: syz [ 2172.804396][T24407] loop3: detected capacity change from 0 to 386 [ 2172.819862][T20602] usb 2-1: config 0 descriptor?? [ 2172.877945][T24407] Currently only 4K block size supported! [ 2172.903574][T24407] Mount JFS Failure: -22 [ 2172.922297][T24407] jfs_mount failed w/return code = -22 [ 2172.999395][T24407] loop3: detected capacity change from 0 to 386 [ 2173.029480][T24407] Currently only 4K block size supported! 08:10:56 executing program 1: utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x44fbef8f1f18c5ca) 08:10:56 executing program 2: mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x6) 08:10:56 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000200)='./file0/file0\x00', 0x0, 0x0) 08:10:56 executing program 4: sync() sync() pipe2(0x0, 0x0) close(0xffffffffffffffff) sync() 08:10:56 executing program 5: mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x8000, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TIOCCONS(r0, 0x80047462) [ 2173.053960][T24407] Mount JFS Failure: -22 [ 2173.099571][T20602] usb-storage 2-1:0.166: USB Mass Storage device detected [ 2173.110343][T20602] usb-storage 2-1:0.166: Quirks match for vid 1645 pid 0007: 4 08:10:56 executing program 5: madvise(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x5) [ 2173.146865][T24407] jfs_mount failed w/return code = -22 [ 2173.193481][T20602] usb 2-1: USB disconnect, device number 74 08:10:56 executing program 2: setitimer(0x0, &(0x7f0000000440)={{}, {0x100000001}}, 0x0) 08:10:56 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000740c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:10:56 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) 08:10:56 executing program 0: select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, 0xffffffff}) 08:10:56 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001680), 0x0, 0x0) setrlimit(0x8, &(0x7f0000000000)) dup(r0) 08:10:56 executing program 2: r0 = socket$inet(0x2, 0x3, 0x0) getsockopt$inet_opts(r0, 0x0, 0x6d, 0x0, 0x0) [ 2173.538064][T24446] loop3: detected capacity change from 0 to 386 08:10:57 executing program 1: pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000180)='<', 0x1}], 0x1) [ 2173.659761][T24446] Currently only 4K block size supported! 08:10:57 executing program 4: mknod(&(0x7f0000000040)='./file1\x00', 0x8000, 0x7fff) open$dir(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) [ 2173.728415][T24446] Mount JFS Failure: -22 [ 2173.743233][T24446] jfs_mount failed w/return code = -22 08:10:57 executing program 2: r0 = socket(0x18, 0x2, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1021, &(0x7f0000000000), 0x10) [ 2173.813017][T24446] loop3: detected capacity change from 0 to 386 [ 2173.831623][T24446] Currently only 4K block size supported! [ 2173.852706][T24446] Mount JFS Failure: -22 08:10:57 executing program 4: sendmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0xfffffe82}, 0x0) 08:10:57 executing program 5: madvise(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa79154c666d1a19c) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) 08:10:57 executing program 1: utimensat(0xffffffffffffffff, 0x0, &(0x7f00000000c0)={{0x0, 0x47c88a25}}, 0x0) [ 2173.874178][T24446] jfs_mount failed w/return code = -22 08:10:57 executing program 2: r0 = socket(0x18, 0x2, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x10, &(0x7f0000000000)={0xffffffffffffffff}, 0x10) 08:10:57 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010007a0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:10:57 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x10, &(0x7f0000000000)=0x3f, 0x4) [ 2174.194771][T24482] loop3: detected capacity change from 0 to 386 [ 2174.221609][T24482] Currently only 4K block size supported! [ 2174.232910][T24482] Mount JFS Failure: -22 [ 2174.237389][T24482] jfs_mount failed w/return code = -22 [ 2174.307156][T24482] loop3: detected capacity change from 0 to 386 [ 2174.327988][T24482] Currently only 4K block size supported! [ 2174.356960][T24482] Mount JFS Failure: -22 [ 2174.378739][T24482] jfs_mount failed w/return code = -22 08:10:57 executing program 0: r0 = socket$inet6(0x18, 0x1, 0x0) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=""/218, 0xda}, 0x0) 08:10:57 executing program 1: mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) 08:10:57 executing program 2: symlinkat(&(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00') mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0) 08:10:57 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_linger(r0, 0xffff, 0x80, 0x0, 0x0) 08:10:57 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000fe0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:10:57 executing program 1: mknod(&(0x7f0000000000)='./file1\x00', 0x8000, 0x0) chroot(&(0x7f0000000040)='./file1\x00') 08:10:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x100, &(0x7f0000000040), 0x4) 08:10:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000640)="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", 0x265, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000040)=""/27, 0x1b}, {&(0x7f0000000100)=""/77, 0x4d}, {&(0x7f0000000180)=""/226, 0xe2}, {&(0x7f0000000280)=""/78, 0x4e}, {&(0x7f0000000300)=""/144, 0x90}, {&(0x7f0000000080)=""/60, 0x3c}, {&(0x7f00000003c0)=""/1, 0x1}], 0x7}, 0x842) 08:10:58 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x8, &(0x7f0000000080)=0x8, 0x4) 08:10:58 executing program 2: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) close(r0) shutdown(r0, 0x0) [ 2174.712782][T24504] loop3: detected capacity change from 0 to 386 [ 2174.765947][T24504] Currently only 4K block size supported! [ 2174.818418][T24504] Mount JFS Failure: -22 08:10:58 executing program 0: r0 = socket$inet6(0x18, 0x3, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1, 0x0, 0x0) 08:10:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r0, 0x0, 0x0) 08:10:58 executing program 1: readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000000)=""/244, 0xf4}, {&(0x7f0000000100)=""/39, 0x27}, {&(0x7f0000000140)=""/213, 0xd5}, {&(0x7f0000000240)=""/102, 0x66}, {&(0x7f00000002c0)=""/89, 0xfffffffffffffdb3}, {&(0x7f0000000340)=""/165, 0xa5}, {&(0x7f0000000400)=""/215, 0xd7}, {&(0x7f0000000500)=""/229, 0xe5}], 0x8) [ 2174.882066][T24504] jfs_mount failed w/return code = -22 08:10:58 executing program 2: setrlimit(0x8, &(0x7f0000000000)) socket$unix(0x1, 0x1, 0x0) 08:10:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00') [ 2174.930090][T24504] loop3: detected capacity change from 0 to 386 [ 2174.955387][T24504] Currently only 4K block size supported! 08:10:58 executing program 0: munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) [ 2175.008493][T24504] Mount JFS Failure: -22 [ 2175.013030][T24504] jfs_mount failed w/return code = -22 08:10:58 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000d", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:10:58 executing program 2: utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000040)={{}, {0x0, 0x100000000}}, 0x0) 08:10:58 executing program 0: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) [ 2175.401250][T24538] loop3: detected capacity change from 0 to 386 [ 2175.420382][T24538] jfs_mount: Mount Failure: superblock is corrupt! [ 2175.427218][T24538] Mount JFS Failure: -22 [ 2175.433659][T24538] jfs_mount failed w/return code = -22 08:10:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000010c0)={0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x20, &(0x7f0000001100), 0x4) 08:10:58 executing program 1: select(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xfffffffffffffff7}) 08:10:58 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff}) writev(r0, &(0x7f0000000100)=[{0x0}], 0x1) 08:10:58 executing program 2: mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) munlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) 08:10:58 executing program 0: recvfrom(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)=@un=@file={0x0, './file0\x00'}, 0xffffffffffffff4a) [ 2175.478541][T24538] loop3: detected capacity change from 0 to 386 [ 2175.490760][T24538] jfs_mount: Mount Failure: superblock is corrupt! [ 2175.499206][T24538] Mount JFS Failure: -22 [ 2175.503716][T24538] jfs_mount failed w/return code = -22 08:10:58 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x82c0, 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0) 08:10:58 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000e", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:10:58 executing program 2: mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x7, 0x10, 0xffffffffffffff9c, 0x0) 08:10:58 executing program 0: r0 = socket$inet6(0x18, 0x1, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0x69, &(0x7f0000000000)={{0x18, 0x3}, {0x18, 0x2}}, 0x3c) 08:10:59 executing program 4: accept(0xffffffffffffffff, &(0x7f00000001c0)=@in, &(0x7f0000000200)=0xc) 08:10:59 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff}) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 08:10:59 executing program 2: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) close(r0) ftruncate(r0, 0x0) [ 2175.843920][T24569] loop3: detected capacity change from 0 to 386 08:10:59 executing program 5: pipe(&(0x7f0000000240)={0xffffffffffffffff}) ioctl$TIOCCONS(r0, 0x80047462) 08:10:59 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getdents(r1, 0x0, 0x0) 08:10:59 executing program 0: r0 = syz_open_pts(0xffffffffffffffff, 0x0) close(r0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) 08:10:59 executing program 2: shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000100)) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4) [ 2175.937092][T24569] jfs_mount: Mount Failure: superblock is corrupt! 08:10:59 executing program 1: nanosleep(&(0x7f0000000000), &(0x7f0000000080)) [ 2175.983530][T24569] Mount JFS Failure: -22 [ 2175.991707][T24569] jfs_mount failed w/return code = -22 08:10:59 executing program 0: socketpair(0x1, 0x1, 0x1, &(0x7f0000000180)) [ 2176.047745][T24569] loop3: detected capacity change from 0 to 386 [ 2176.062367][T24569] jfs_mount: Mount Failure: superblock is corrupt! [ 2176.074479][T24569] Mount JFS Failure: -22 [ 2176.082122][T24569] jfs_mount failed w/return code = -22 08:10:59 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000f", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:10:59 executing program 5: setrlimit(0x8, &(0x7f0000000000)={0x3, 0x3f}) open(0x0, 0x0, 0x0) 08:10:59 executing program 4: mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) 08:10:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) getsockname$inet(r2, 0x0, &(0x7f0000000000)=0xffffffffffffffea) 08:10:59 executing program 2: r0 = socket$inet6(0x18, 0x3, 0x0) setsockopt$sock_int(r0, 0xffff, 0x8, 0x0, 0xdf) 08:10:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_int(r0, 0xffff, 0x80, 0x0, 0x0) 08:10:59 executing program 4: setuid(0xffffffffffffffff) socketpair(0x18, 0x3, 0x0, 0x0) 08:10:59 executing program 2: r0 = socket$inet(0x2, 0x3, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x841) 08:10:59 executing program 1: r0 = socket(0x2, 0x3, 0x0) getsockopt$sock_int(r0, 0xffff, 0x1004, 0x0, 0x0) 08:10:59 executing program 0: r0 = socket(0x18, 0x2, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x2000, 0x0, 0x0) [ 2176.444281][T24604] loop3: detected capacity change from 0 to 386 [ 2176.462449][T24604] jfs_mount: Mount Failure: superblock is corrupt! [ 2176.474253][T24604] Mount JFS Failure: -22 [ 2176.478839][T24604] jfs_mount failed w/return code = -22 08:10:59 executing program 5: madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) munmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 08:10:59 executing program 4: utimes(&(0x7f0000000000)='.\x00', &(0x7f0000000040)) [ 2176.570253][T24604] loop3: detected capacity change from 0 to 386 [ 2176.598447][T24604] jfs_mount: Mount Failure: superblock is corrupt! [ 2176.617433][T24604] Mount JFS Failure: -22 [ 2176.622729][T24604] jfs_mount failed w/return code = -22 08:11:00 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000001f", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:00 executing program 0: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) munmap(&(0x7f0000800000/0x800000)=nil, 0x800000) 08:11:00 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) fcntl$lock(r0, 0x6, &(0x7f0000000080)) 08:11:00 executing program 2: preadv(0xffffffffffffffff, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/22, 0x12}, {&(0x7f0000000280)=""/181, 0xb5}, {&(0x7f0000000340)=""/57, 0xffffffffffffffa7}, {&(0x7f00000003c0)=""/227, 0xe3}, {&(0x7f0000001640)=""/110, 0x6e}, {&(0x7f0000000540)=""/84, 0x3}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x7, 0x0, 0x0) 08:11:00 executing program 1: semget$private(0x0, 0x4, 0x530) semctl$GETALL(0x0, 0x0, 0x6, &(0x7f00000004c0)=""/143) r0 = semget$private(0x0, 0x8, 0x10286) semop(r0, &(0x7f0000000280)=[{0x0, 0x7fff, 0x1800}, {0x0, 0x0, 0xa41a264831122cc0}, {0x4, 0x0, 0x800}, {0x2, 0x1fb0, 0x1000}, {0x1, 0x6b8}, {0x0, 0x6, 0x1000}], 0x6) semop(0x0, &(0x7f0000000300), 0x0) semctl$GETZCNT(r0, 0x1, 0x7, &(0x7f00000001c0)=""/157) semop(r0, &(0x7f0000000300)=[{0x0, 0x8000, 0x1000}, {0x4, 0x3b10, 0x1000}, {0x1, 0x6, 0x800}, {0x0, 0x20, 0x1000}, {0x3, 0x8001, 0x1000}], 0x5) r1 = semget$private(0x0, 0x2, 0x3e) semop(r1, &(0x7f0000000000)=[{0x3, 0x2000}, {0x1, 0x1, 0x17fc}, {0x2, 0x1009, 0x1000}, {0x0, 0x2, 0x1800}], 0x4) close(0xffffffffffffffff) semop(r1, &(0x7f0000000080)=[{0x4, 0x5, 0x1400}, {0x2, 0xf0a, 0x1800}, {0x1}, {0x4, 0xfffd, 0x1000}], 0x4) semop(r1, &(0x7f0000000180)=[{0x2, 0x9, 0x1000}, {0x3, 0x6, 0x1800}, {0x4, 0x104}, {0x1, 0x6, 0x1000}, {0x1, 0x245, 0x1000}, {0x2, 0x7953, 0x1800}, {0x2, 0x1ff, 0x1000}, {0x1, 0x4}, {0x0, 0xc331, 0x1800}, {0x4, 0xffb4, 0x1000}], 0xa) semctl$IPC_RMID(r1, 0x0, 0x0) r2 = open(&(0x7f0000000480)='./file0\x00', 0x80000000000205, 0xfffffffffffffffd) semctl$SETVAL(r0, 0x2, 0x8, &(0x7f0000000040)=0x5) writev(r2, &(0x7f0000000640)=[{&(0x7f0000000140)='#!', 0x2}], 0x1) r3 = fcntl$dupfd(r2, 0x0, r2) write(r3, &(0x7f0000000100)=' \n', 0x3) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) semop(0x0, &(0x7f0000000340)=[{0x1, 0x51}, {0x7, 0xefb, 0x1800}, {0x4, 0x7fff}, {0x3, 0x4, 0x1800}, {0x1, 0x7f, 0x1000}, {0x0, 0xb8, 0x800}, {0x3, 0x7, 0x400}], 0x7) 08:11:00 executing program 4: r0 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) read(r0, 0x0, 0x0) 08:11:00 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0xa) 08:11:00 executing program 5: writev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000080)="14e45fe01411ac9fd0d6168efb10773d9a67157f6c2705d7d06054de00fd4797634f90bc95bd6a3e77e88c7de5bd06", 0x2f}], 0xffffffffffffe41) 08:11:00 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) recvmsg(r0, &(0x7f0000001800)={&(0x7f0000000000)=@un=@abs, 0x8, &(0x7f0000000600)=[{&(0x7f0000000400)=""/202, 0xca}, {&(0x7f0000000140)=""/211, 0xdf}, {&(0x7f0000000080)=""/90, 0x9c}, {&(0x7f0000000500)=""/199, 0xc4}, {&(0x7f0000000040)=""/25, 0x12}, {&(0x7f0000001c00)=""/4096, 0x1000}, {&(0x7f0000001400)=""/76, 0x50}, {&(0x7f0000001480)=""/185, 0xb9}, {&(0x7f0000000240)=""/87, 0x57}, {&(0x7f0000001a40)=""/133, 0xfffffffffffffec0}], 0xa, &(0x7f0000001740)=""/181, 0xb5}, 0x0) [ 2176.937031][T24640] loop3: detected capacity change from 0 to 386 08:11:00 executing program 5: munmap(&(0x7f0000ffa000/0x1000)=nil, 0x1000) munmap(&(0x7f0000ffa000/0x6000)=nil, 0x6000) [ 2177.003849][T24640] jfs_mount: Mount Failure: superblock is corrupt! [ 2177.011383][T24640] Mount JFS Failure: -22 [ 2177.015871][T24640] jfs_mount failed w/return code = -22 08:11:00 executing program 5: symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x281, 0x0) 08:11:00 executing program 1: poll(0x0, 0x3a, 0x0) [ 2177.055876][T24640] loop3: detected capacity change from 0 to 386 [ 2177.067443][T24640] jfs_mount: Mount Failure: superblock is corrupt! [ 2177.074399][T24640] Mount JFS Failure: -22 [ 2177.079160][T24640] jfs_mount failed w/return code = -22 08:11:00 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000031", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x200, 0x0) ftruncate(r0, 0x0) 08:11:00 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) poll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0) 08:11:00 executing program 0: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f0000000000)="e55413c3adc1af4708c721a13cf8986bfcd4f1d35f1b80fd0bb047d47ec579ce143fed3d9e9e2174fa7b3f63", 0x2c) 08:11:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x800, &(0x7f0000000040), 0x4) 08:11:00 executing program 1: open$dir(&(0x7f0000000140)='./file0\x00', 0x200, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 08:11:00 executing program 4: select(0x2, &(0x7f0000000000)={0xc}, &(0x7f0000000080)={0x2}, 0x0, 0x0) 08:11:00 executing program 2: munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 08:11:00 executing program 1: msgctl$IPC_SET(0x0, 0x1, &(0x7f00000000c0)={{0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff}) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) 08:11:00 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f00000000c0)={0x80000000}, 0x8) [ 2177.415105][T24679] loop3: detected capacity change from 0 to 386 08:11:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000300)='./file1\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) open(&(0x7f0000000100)='./file0\x00', 0x2, 0x0) [ 2177.498152][T24679] jfs_mount: Mount Failure: superblock is corrupt! 08:11:00 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, &(0x7f0000000980)=""/116, 0x74, 0x2, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001400)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000080)="1bb7910a9477ba72a6bc574b52b4", 0xe}, {&(0x7f00000000c0)="92651368e303e29fcb64ff4d78eecb5e3a6e1e8c462f8ca7b8efea54ecaee80751e56e94550bf59a21410dfde8b9bbeeff14a325dc6e352761cde66903765cece0f4c3e6434e82c21ed522519b924b96eb6c215362bf3bfdf69533b68f4c872b1b06794f6a6438", 0x67}], 0x2}, 0x0) [ 2177.567366][T24679] Mount JFS Failure: -22 [ 2177.572203][T24679] jfs_mount failed w/return code = -22 [ 2177.617556][T24679] loop3: detected capacity change from 0 to 386 [ 2177.630970][T24679] jfs_mount: Mount Failure: superblock is corrupt! [ 2177.638961][T24679] Mount JFS Failure: -22 [ 2177.644067][T24679] jfs_mount failed w/return code = -22 08:11:01 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000036", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:01 executing program 5: mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x8000, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TIOCSPGRP(r0, 0x40047477, &(0x7f0000000080)) 08:11:01 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) sendmsg$unix(r0, &(0x7f0000003e80)={&(0x7f0000000100)=@abs={0x0, 0x0, 0x1}, 0x8, 0x0, 0x0, &(0x7f0000003d80)}, 0x0) 08:11:01 executing program 0: r0 = socket$inet6(0x18, 0x1, 0x0) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000003c0)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000000440)=""/176, 0xb0}, 0x1) 08:11:01 executing program 2: r0 = socket$inet(0x2, 0x3, 0x0) getsockopt$inet_opts(r0, 0x0, 0x1d, 0x0, 0x0) 08:11:01 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_timeval(r0, 0xffff, 0x1006, 0x0, 0x0) [ 2177.876838][T24702] loop3: detected capacity change from 0 to 386 [ 2177.894699][T24702] jfs_mount: Mount Failure: superblock is corrupt! [ 2177.901831][T24702] Mount JFS Failure: -22 [ 2177.906215][T24702] jfs_mount failed w/return code = -22 08:11:01 executing program 1: mknod(&(0x7f0000000100)='./file0\x00', 0x8000, 0x313) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) [ 2177.959292][T24702] loop3: detected capacity change from 0 to 386 [ 2177.967641][T24702] jfs_mount: Mount Failure: superblock is corrupt! [ 2177.988527][T24702] Mount JFS Failure: -22 [ 2177.992837][T24702] jfs_mount failed w/return code = -22 08:11:01 executing program 4: getgroups(0x7, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff]) setregid(0x0, r0) setgid(r0) 08:11:01 executing program 0: clock_gettime(0x13, 0x0) 08:11:01 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000003c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:01 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x9, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x200000100000001}) 08:11:01 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x4) read(r0, &(0x7f0000000040)=""/49, 0x31) 08:11:01 executing program 4: r0 = socket$inet(0x2, 0x3, 0x0) getsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f0000000080)=""/133, &(0x7f0000000140)=0x85) [ 2178.276015][T24729] loop3: detected capacity change from 0 to 386 [ 2178.302844][T24729] jfs_mount: Mount Failure: superblock is corrupt! [ 2178.309900][T24729] Mount JFS Failure: -22 [ 2178.314595][T24729] jfs_mount failed w/return code = -22 [ 2178.413677][T24729] loop3: detected capacity change from 0 to 386 [ 2178.434320][T24729] jfs_mount: Mount Failure: superblock is corrupt! [ 2178.453857][T24729] Mount JFS Failure: -22 [ 2178.458560][T24729] jfs_mount failed w/return code = -22 08:11:01 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f0000000000), 0x0) 08:11:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r0, 0x0, 0x0) 08:11:01 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1800000000000000, 0xffffffffffffffff}) 08:11:01 executing program 4: mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x8000, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) poll(&(0x7f00000000c0)=[{r0, 0x40}], 0x1, 0x0) 08:11:01 executing program 1: mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) 08:11:01 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000003f", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:02 executing program 1: setrlimit(0x8, &(0x7f0000000900)={0x20405, 0x400000fe}) 08:11:02 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) getdents(r0, 0x0, 0x0) 08:11:02 executing program 0: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1005, &(0x7f00000000c0)={0x0, 0x5}, 0x10) 08:11:02 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x1, &(0x7f0000000000), 0x4) [ 2178.724083][T24758] loop3: detected capacity change from 0 to 386 08:11:02 executing program 1: r0 = socket$inet(0x2, 0x3, 0x0) bind(r0, &(0x7f00000000c0)=@un=@abs={0x0, 0x0, 0x1}, 0x8) 08:11:02 executing program 4: munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x1811, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) [ 2178.809742][T24758] jfs_mount: Mount Failure: superblock is corrupt! [ 2178.823288][T24758] Mount JFS Failure: -22 [ 2178.831051][T24758] jfs_mount failed w/return code = -22 [ 2178.865086][T24758] loop3: detected capacity change from 0 to 386 [ 2178.875995][T24758] jfs_mount: Mount Failure: superblock is corrupt! [ 2178.886106][T24758] Mount JFS Failure: -22 [ 2178.890826][T24758] jfs_mount failed w/return code = -22 08:11:02 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_int(r0, 0xffff, 0x0, 0x0, 0x0) 08:11:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000640)="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", 0x171, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000100)=""/77, 0x4d}, {&(0x7f0000000180)=""/226, 0xe2}, {&(0x7f0000000280)=""/78, 0x4e}], 0x3}, 0x0) 08:11:02 executing program 4: munmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4, 0x1811, 0xffffffffffffffff, 0x0) 08:11:02 executing program 1: madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x1810, 0xffffffffffffffff, 0x0) 08:11:02 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv(r0, &(0x7f0000000240)=[{0x0}], 0x1, 0x0, 0x0) 08:11:02 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000044", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:02 executing program 4: r0 = socket$inet(0x2, 0x3, 0x0) getsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) 08:11:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x4, 0x0, 0x0) 08:11:02 executing program 2: poll(0x0, 0x0, 0x80000001) 08:11:03 executing program 0: r0 = syz_open_pts(0xffffffffffffffff, 0x0) pwritev(r0, &(0x7f0000000200)=[{0x0}], 0x1, 0x0, 0x0) [ 2179.662645][T24801] loop3: detected capacity change from 0 to 386 [ 2179.726516][T24801] jfs_mount: Mount Failure: superblock is corrupt! [ 2179.733224][T24801] Mount JFS Failure: -22 [ 2179.737586][T24801] jfs_mount failed w/return code = -22 08:11:03 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGETD(r0, 0x4004741a, &(0x7f0000000080)) 08:11:03 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000051", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:03 executing program 5: pipe2(&(0x7f0000001780)={0xffffffffffffffff}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r0, r1) dup2(r3, r2) 08:11:03 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) bind(r0, &(0x7f0000001580)=@in={0x2, 0x3}, 0xc) 08:11:03 executing program 0: mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) 08:11:03 executing program 4: r0 = socket$inet6(0x18, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x3a, 0x66, 0x0, 0x0) [ 2180.166318][T24823] loop3: detected capacity change from 0 to 386 [ 2180.221616][T24823] jfs_mount: Mount Failure: superblock is corrupt! [ 2180.296850][T24823] Mount JFS Failure: -22 08:11:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$sock_int(r0, 0xffff, 0x1003, 0x0, 0x0) 08:11:03 executing program 5: mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) 08:11:03 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000000)={0x0, 0x10000}, 0x8) 08:11:03 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000240)="eb", 0x1}, {&(0x7f0000000280)='_', 0x1}], 0x2, &(0x7f0000000300)=[{0xe8, 0x1, 0x0, "0aa96dbaef8bab70a3612ec11b1887ea46597525b9bccbf23c64cb2071af27395c1b4239c496eacf6a77098b257fa27f0f77bf9ce8e85cddaca88e3965636fa43e5915c36292e7a8bbeed43ab5db9007d8a7792b20c2ec2559ac8268cc717320eb57202f1467e5d63d19592b94ac4473c6a24bd4ff016ce550327d9af57c4e8a935e9b84878d8ca43e457bc70cfbd9106c77b62914143234c5e11daa0990d0d8ab50c53e5e26400a77e23030e0c740b47ef25c6ffe3d0302ad37befdc6a4e247edf83b4e5dfe1e1485239056cdd9885821"}], 0xe8}, 0x0) [ 2180.335346][T24823] jfs_mount failed w/return code = -22 [ 2180.424621][T24823] loop3: detected capacity change from 0 to 386 [ 2180.456901][T24823] jfs_mount: Mount Failure: superblock is corrupt! [ 2180.514303][T24823] Mount JFS Failure: -22 [ 2180.532252][T24823] jfs_mount failed w/return code = -22 08:11:04 executing program 2: mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) mprotect(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0) 08:11:04 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x11, &(0x7f0000000000)=""/99, 0x5d}, 0x0) 08:11:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000640)="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", 0x171, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000040)=""/27, 0x1b}], 0x1}, 0x0) 08:11:04 executing program 5: mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x8000, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setown(r0, 0x6, 0x0) 08:11:04 executing program 4: mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x8000, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 08:11:04 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000005d", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:04 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCOUTQ(r0, 0x40047473, &(0x7f0000000100)) 08:11:04 executing program 0: symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) [ 2180.900660][T24856] loop3: detected capacity change from 0 to 386 [ 2180.916310][T24856] jfs_mount: Mount Failure: superblock is corrupt! [ 2180.927586][T24856] Mount JFS Failure: -22 [ 2180.936263][T24856] jfs_mount failed w/return code = -22 08:11:04 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000000), 0x1) 08:11:04 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000680)=@file={0x0, './file1\x00'}, 0xa) 08:11:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r0, 0xffff, 0x100, 0x0, 0x0) [ 2181.019449][T24856] loop3: detected capacity change from 0 to 386 [ 2181.038290][T24856] jfs_mount: Mount Failure: superblock is corrupt! [ 2181.045091][T24856] Mount JFS Failure: -22 [ 2181.050601][T24856] jfs_mount failed w/return code = -22 08:11:04 executing program 5: mlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 08:11:04 executing program 1: r0 = socket$inet(0x2, 0x3, 0x0) getsockopt$sock_int(r0, 0xffff, 0x10, 0x0, 0x0) 08:11:04 executing program 0: r0 = socket(0x2, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f0000000040)="5e1237b069b2ab4b7ce7ed77d80120ed21b7c48073706871", 0x18) 08:11:04 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000063", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:04 executing program 4: mlock(&(0x7f0000bff000/0x400000)=nil, 0x400000) munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) 08:11:04 executing program 2: mmap(&(0x7f0000ffe000/0x1000)=nil, 0x7ffffffffff, 0x0, 0x1811, 0xffffffffffffffff, 0x0) [ 2181.406652][T24890] loop3: detected capacity change from 0 to 386 08:11:04 executing program 0: r0 = socket$inet6(0x18, 0x3, 0x0) sendto$inet6(r0, 0x0, 0xfffffee2, 0x0, &(0x7f0000000100)={0x18, 0x3}, 0xc) 08:11:04 executing program 2: poll(&(0x7f0000001ac0), 0x3c, 0x0) 08:11:04 executing program 5: accept(0xffffffffffffffff, &(0x7f0000000040)=@un=@abs, 0xffffffffffffffff) [ 2181.517856][T24890] jfs_mount: Mount Failure: superblock is corrupt! [ 2181.528706][T24890] Mount JFS Failure: -22 [ 2181.533223][T24890] jfs_mount failed w/return code = -22 08:11:04 executing program 1: mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0) r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x2, 0x0) fcntl$setown(r0, 0x6, 0xffffffffffffffff) 08:11:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000040)="6eb14e2a81abd7fa373956a3cade74761ce8b3713d05fd5badfaef47a3c8f5d6fae66b7269fc65434b517793cd0b663d1eb6b1e7180d53838d797a55936ff4174cd86be6621ba336b6020e20ffb453e48e5b9917cd37a53a2eb01b32b1ef0b9378d990a3d3e08c8c83dcc4437103afe6c9cc7ac93a387822e5fe0b", 0x7b}, {&(0x7f00000000c0)="a14e95f55582d6b3ac2546178b3aca086c0f57df140acb1d85d80b0f593f14846fdfeeb426abe8d6dd024f350f28da19d8de1f4ee31ab65c477613318af919a76e4c5a46166f40727442c1675c4ed6f17f71dfc7a1b1e43fbffd10eb686bb6c15a0eab119f1cf92a3feac7f7fee67c83cfd9b57ccf0d31a0ade1aeff555937b549c6b74bbfb92a5e1be7cb2892ba7f9439b7c254fdfc114156bbf63ef3d5824c1e36f698ea0fc16a1d0f4e3f5bf53f8716de278d9322a04bcdf05db1e675e88775fe1c4f7a1cbfc449ca685b6a0ca4cf68436b2b8146392a97bde3bbb2fe5cedd0", 0xe1}, {&(0x7f0000001040)="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", 0xea5}], 0x3}, 0x1) [ 2181.596808][T24890] loop3: detected capacity change from 0 to 386 [ 2181.607856][T24890] jfs_mount: Mount Failure: superblock is corrupt! [ 2181.615132][T24890] Mount JFS Failure: -22 [ 2181.619903][T24890] jfs_mount failed w/return code = -22 08:11:05 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000006f", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:05 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x8004741b, &(0x7f0000000040)=0x7ff) 08:11:05 executing program 2: writev(0xffffffffffffffff, &(0x7f0000000140)=[{0x0}], 0x1) clock_gettime(0x4, &(0x7f0000000000)) 08:11:05 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$FIONREAD(r0, 0x4004667f, &(0x7f0000000040)) 08:11:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) 08:11:05 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001680), 0x0, 0x0) fcntl$lock(r0, 0x9, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x100000000, 0xffffffffffffffff}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000001680), 0x0, 0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 08:11:05 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setown(r0, 0x6, 0x0) [ 2181.940372][T24919] loop3: detected capacity change from 0 to 386 08:11:05 executing program 0: pipe2(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = getpgid(0x0) fcntl$setown(r0, 0x6, r1) fcntl$setown(r0, 0x6, r1) 08:11:05 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000000)=""/11, 0xb) [ 2182.050238][T24919] jfs_mount: Mount Failure: superblock is corrupt! [ 2182.056993][T24919] Mount JFS Failure: -22 [ 2182.061513][T24919] jfs_mount failed w/return code = -22 [ 2182.133638][T24919] loop3: detected capacity change from 0 to 386 [ 2182.160117][T24919] jfs_mount: Mount Failure: superblock is corrupt! [ 2182.235939][T24919] Mount JFS Failure: -22 08:11:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) readv(r0, &(0x7f0000000400)=[{0x0}], 0x1) 08:11:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r1) sendmsg$unix(r0, &(0x7f0000002700)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=[@rights], 0x10}, 0x40b) 08:11:05 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000540)=[{&(0x7f00000005c0)="14ff8df3e1140949d6bb97b9737a25eb8f07356a74c740d72521b0bbf1a67a33089b0add96c405540d41ee925b6c63a5ad9429ed6c9a7fb98e197cf890da49497b4de659601aa7d1db655cc5c464fab6c077e98828e8d87c05941d9dc4c0c49c5442c5e9c84ae5b52ecc9977b58f80db003c7d7873b523e1d28e168102acad1b20dacdfe", 0x84}, {&(0x7f0000000100)="2d35ef92a646d19bfbf5273f6d71b60c3ad308acb351a31c91c024d34ea05e89dd7e7da973402b8b69344a6d73", 0x2d}, {&(0x7f0000000140)="1edb5ca1e47e33b3c95bbeec33f6de329ce4e2ff5db2df9b52e4705ef0a059b0b5d9702c9dcc87a1130812769c7cdf4eef84029f23a0c2ab1cedee4c25e84b19ab10af87644876af0af4c59e88940a90c37a41b6a7d3c3a2020272348d581cd677ddfdd71710f1a01bc1436353cc46071476a7cf77de62dd39a7182bebd6ed4a2467517eb29dc66ba3ae4e4657aad02122e1e203bedab61e3aa2682910c7985f3d9f148c987b7fb7c93c49d9558fd9b8a5554386aa383bafac396ab76d297b83404e72322b6f77ae4a4c4603a9af27ce2f202309039882725d", 0xd9}, {&(0x7f0000000340)="b6bf7b25238eb7f7605dcf5f603b3e073483243b3a1ccfd47e9b4e399e4dc8f2554614f750f0c0adb5b3d59a4849f59fe452da74c27661ea58fac0adb2ddfaad3595fb757a3829b7380e829fde2459e65e59467a247e28e3d36ac9bfd346c4671a5fb09dea662d08c8a47a5adcce76de7da81488cc20077f2c4f053e0f986c9fe64657576111e068d564fe7296a0b36f24cb3c843fba7f02945d3bcd57b7d3dde79540054ee0265013fb73555401c719081570cb690598fd72748806b55a4f38ef226c329d98eab9a15f40941e6cbd4534d3094d3688b44e2b1f2231da3a2d15df122f0680c1", 0xe6}, {&(0x7f0000000440)="28e3c5384ef04acbc3e0ec9b5d7091d6b3d65dedfc93de13e797443f2d9f7512f7c29b1311789aff43ffb616ceda025c9bf2677f7598846d767a4ef4dbc328ab6acbcffd0aaa7d940563c6574646a965156581662c2bdb3476865b7ff71a130778e98e1c670fa048f42fe38f273ce9cf5281336429c1ecfd5f038bb7ba56a498aba8f33c44113d1ab4ff515707ffa4105d7bf15eafe61cce1bff4ed66a2e7059c7e42f8a517f4af0d5a78f43434eed01532e1cdc188cfc46e92392fb7af8d8ccf9b32facdf4e928d6501429791a04b9d51a9802a3460cb5e1cc03df21e9d81e12619447d2790762dcfb9", 0xea}], 0x1000000000000320, 0x0, 0x0, 0xb}, 0x400) [ 2182.274558][T24919] jfs_mount failed w/return code = -22 08:11:05 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000088", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:05 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSWINSZ(r0, 0x80087467, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x802}) 08:11:05 executing program 0: read(0xffffffffffffffff, &(0x7f00000001c0)=""/258, 0xfffffffffffffead) 08:11:05 executing program 2: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) fcntl$getown(r0, 0x5) 08:11:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) 08:11:05 executing program 1: fchmod(0xffffffffffffffff, 0x5f347bd2145d516e) 08:11:05 executing program 0: madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 08:11:05 executing program 2: mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mprotect(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0) mlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) munmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 08:11:06 executing program 4: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) madvise(&(0x7f0000ffa000/0x5000)=nil, 0x5000, 0x4) [ 2183.098101][T24966] loop3: detected capacity change from 0 to 386 [ 2183.117323][T24966] jfs_mount: Mount Failure: superblock is corrupt! [ 2183.124499][T24966] Mount JFS Failure: -22 [ 2183.131016][T24966] jfs_mount failed w/return code = -22 08:11:06 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0xffffffffffffff28, &(0x7f0000000200)=""/93, 0x5d}, 0x0) 08:11:06 executing program 2: munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) 08:11:06 executing program 1: r0 = socket$inet6(0x18, 0x3, 0x0) recvfrom(r0, 0x0, 0xffffffffffffff2a, 0x0, 0x0, 0x0) [ 2183.188897][T24966] loop3: detected capacity change from 0 to 386 [ 2183.205579][T24966] jfs_mount: Mount Failure: superblock is corrupt! [ 2183.226124][T24966] Mount JFS Failure: -22 [ 2183.249335][T24966] jfs_mount failed w/return code = -22 08:11:06 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100000ff", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:06 executing program 0: r0 = socket$inet6(0x18, 0x3, 0x0) sendto(r0, 0x0, 0xfffffffffffffddb, 0x0, &(0x7f0000000000)=@in6={0x18}, 0xc) 08:11:06 executing program 4: select(0xfffffff3, &(0x7f0000000000), &(0x7f0000000080), 0x0, 0x0) 08:11:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x10, &(0x7f0000000200), 0x4) 08:11:06 executing program 1: utimes(0x0, &(0x7f0000000040)={{0x0, 0xfffffffffffff801}}) 08:11:06 executing program 0: mlock(&(0x7f0000fee000/0x12000)=nil, 0x12000) msync(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x5) 08:11:06 executing program 2: mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 08:11:06 executing program 4: r0 = socket$inet(0x2, 0x3, 0x0) r1 = dup(r0) r2 = fcntl$dupfd(r1, 0x0, r0) sendto$inet6(r2, 0x0, 0x0, 0x403, &(0x7f00000010c0)={0x18, 0x3}, 0xc) 08:11:06 executing program 1: unlinkat(0xffffffffffffffff, 0x0, 0x5667fb3250b5ae09) [ 2183.692998][T24992] loop3: detected capacity change from 0 to 386 08:11:07 executing program 5: mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000, 0x100) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 08:11:07 executing program 2: fchmodat(0xffffffffffffff9c, 0x0, 0x0) 08:11:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xa) [ 2183.790893][T24992] jfs_mount: Mount Failure: superblock is corrupt! [ 2183.827203][T24992] Mount JFS Failure: -22 [ 2183.832453][T24992] jfs_mount failed w/return code = -22 [ 2183.881264][T24992] loop3: detected capacity change from 0 to 386 [ 2183.903709][T24992] jfs_mount: Mount Failure: superblock is corrupt! [ 2183.946533][T24992] Mount JFS Failure: -22 [ 2183.951467][T24992] jfs_mount failed w/return code = -22 08:11:07 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000002", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:07 executing program 1: faccessat(0xffffffffffffffff, 0x0, 0x0) 08:11:07 executing program 4: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) munmap(&(0x7f0000fff000/0x1000)=nil, 0x1000) 08:11:07 executing program 2: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_STAT(r0, 0x2, 0x0) 08:11:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000002a00), 0x59}, 0x0) 08:11:07 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000240)=[{0x0}], 0x1, 0x0, 0x0) 08:11:07 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff}) writev(r0, &(0x7f00000002c0)=[{&(0x7f00000000c0)="92", 0x1}, {0x0, 0xfffffdaf}, {0x0}], 0x3) 08:11:07 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001680), 0x0, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) read(r0, 0x0, 0x0) dup2(r1, r0) 08:11:07 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_int(r0, 0xffff, 0x10, 0x0, 0x0) [ 2184.238248][T25025] loop3: detected capacity change from 0 to 386 [ 2184.345380][T25025] jfs_mount: Mount Failure: superblock is corrupt! [ 2184.404783][T25025] Mount JFS Failure: -22 08:11:07 executing program 5: r0 = socket(0x2, 0x2, 0x0) getsockname(r0, 0x0, &(0x7f0000000300)) 08:11:07 executing program 0: utimensat(0xffffffffffffffff, 0x0, 0x0, 0x6) 08:11:07 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000001880)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0xa, &(0x7f00000017c0)=[{&(0x7f0000000040)="48b0093d468932229108de84119a0d86bf6eea5663c00941461b87b1d1a55684080582cd0d9ae4d102ed681efd4f9aa8b20ae135fa33341aecfe5ed77bf18499c0375c20f2b87af23d19eb2084d20f948a0ae124b6ec4e0140726651b0a8fbfa661d169904eaac57cd21398338bedcf48b9b6690cf290d1e81c4bda0c828ce2aa2d4bd503227b95b5d84da6d92b0e86bb0a04777b7a33986a8", 0x99}, {&(0x7f0000000100)="7530b76d5f3c920aa0e74bc82e58af350f82dfb411cb9c9b669dad5682cdf73038d8d5514cc1045ce66c66d18ff29c233bf3b504d85066cd5b827f6640e9eaa0134c0fc691ba38aea7bfc91a647fcb5b96f64fc1b0a47e28812a319b19a3090b754b", 0x62}, {&(0x7f0000000180)="53d195f7d4af3d8009d6d4dff7f03b5d5487e3e4cc2ce7fa09a7da28cea85e68adc439964926889112bab1d0a19050293066a7301adef6f8bb9e403ed92a96be42944b73f95e619fdaf90253e4ae6756cdffee5bf2234b0521c33042d26cf591db474f56715775fde1b2c609e26af1b4900bd1596f3df3cd1dd8e5b95e3e2bc1c3d37f4b7dbdf346df21865ab08a71139223a059761fac33b06ae2401ec6117a4c5bf35f12ff3ee0d2de84063b3a9600798382a11d8fb9ebe905335a0382b25a840dc5e7bc68f78ca9143494d8231c0a", 0xd0}, {&(0x7f0000000280)="57594e21a1314ee3e11e6e738874a150bcd8dcb8feec60769f2991b46534dd285dd8220cda4b47d8d8683e17826c3a3e75299fd709a8ae19b7e5212fecf51fb10f4bc7d639ad1c42c7fc3a5eb9c113a8d3547e0b0bc2cb99f50a0c4cbecb94af17b47d605844dac5c35c900a8812a9bdf6163c70cfd23aca4eecd45c6f0d5afa8a6cf8927376488365427df7175f0b45788e14b553e4a6d4ca4f582c637b32aa105fb39d918493836c5f6773f6365d196c3e403fe1363cd6355307f035a3f8cdb28097aaf2a5b7", 0xc7}, {&(0x7f0000000380)="4a4aa970b31658d4685dc61fd0efb550b3511c5c7111e0ad1440b147248e2c0135a1b41712876c4e745cdb256c3ef236f80e4dc115dceff5dbeabc494add5c6202c5f1c78957ef11b4aba57b9fe093ca891f14d0eb58f3f55f8464a74fd5a65697f1f0f73e7d10a9a151648a80565bb81c50e21e07a1db227f21a400d8e6f18d366df1f152061e761c56c9d5d158367d0113af1f8e6f2b52bbbef4f563dfe604d09e06f7793c6fe0cee1df24a071bb131d41ae073b2ae727b15513d8ddaf16bc4fa5b040a351cf3aa9789b4a4a277b567edb4b9f43f012a4750fbefbbecea3", 0xdf}, {&(0x7f0000000480)="d928b5c8f336e845b04c356425fcb091a35ddd8d344a3439fb80767aaf60eac532c9ef6cc610e13684eba80b812646a018a85f0f087c1f6e7f8a5012c12145452c63abc88337231122640e2e7197f2e931c0e96bf7a942417ab40a269d3061bad120406059ade922c9ddcfa58de7d416581568e3cd0fbde85b0f5edffe59dc046c6fc34b6bf3344057432c5510e1ed976a7379e09b9f638d3a6abeda5ade6a77d4efe4ef5e43190bcbb9356dbf14aa40a717b9aa5f6c97bd8817b8b276a4f1898750704b47070bb9ab556c020877b835d2e31fd71591eca92c26fd78d9f92aa0ade945b05386ffbafec1f2959438ec3c9bcff2b39c9610e326b88d1224b5b4379c5f47164590af80d18a95b3d8b0bf6d8c6ed7cd7c7097408a8a11f9c0b50738a44d1ad4a370bb040b354bc46783bc59d38cc479d8bfa355accc6f0d4dfe1d5d0024eed79d1d327352255f1a62194da9c15e0ebb2737d5b495b5e77a8dd90ae9208fda55aa38e82477b68a3f7aa421975dcaeef3e0f057dbc7817a4784d8327e870c2bc1b7366d83082cff1430b2aaf961dd81a3f97f33e6877cd158574682a2ae7cfae62f0ffc3eb2a6a8b01153ecb839e9ccd3e5392dd655169791d0c2da9c08306fa9bb14173c3928f84c7d00c3055a73a96340a78c6f61fa2a12599f69a82d11612f80b6e25033ad7d5931f6490dbeb58a20d2d3a7a4bbd7a8e322caa6dd2eedd61029b8eddab8f710c38f26c864572bce7269004ea47634697bb7a94ec66406aa46ad4b5277642afccc0ddef7b540df7701fc54c6cedce9e46280b7296d9a77dd94b482373e9ff6f4ea63cbd968fd4315007b122df16e10f3028e10da27d1762701f20f7c8501cb190d773d6aae46fe1c0fa0de71e4a4ee3039a0646a53614d36b504c127dbc76f8cfb6eca784a27e61b343ed6a4ec0e583fc03675f7d75d0ca504db1c90554a95aa43f0492fb46297e8f28f715176f2bdcd45e1730dbed97a492581ce5cf7b425bb2579a4d833b170133cb879fd734b9807f7a659052f751dbe145775e7e4b38d503bf34737d31ca7f1fdcfe4441cbbf188d8379b6e1efca3a5e864ecdf735ef04467f8cd0b4df4e797357dc07676f271aa876781b04fb4c776167a74bafaf9e23771f370df21aa84ddbfd899f57f9e61a3d6c6377ea49e858fcb88fc0fc590ce7e799a6df3c43d8d2b7a2ac5655ef62c09199f170376c844595a902b93fe7b03c3ccb24d7d6695a943a4728a50061012c5dac37e760ffb61d3c0805be27c19f0b297bd5cbe3ee025c60e74a716d3a8367ddafa8b28796f15beb8517049f7116d73a1da831eb8366bc8cd3bb1d1250b320f381cfa3250443ded922a7895c92c7dfd47ea020b6a88c76d2a16d8a924782e6d3ffdab23603fdd32ca7325fc06a04bad37a95152660cf6c1b7938b5c6e6084e6a78176e9e550178d200ccb22f7c363a29a2b2453a707c8778a2292c23489f5821429d369147d6391534995fcb09eeabe27882a870ac35e2bb7bd07e41bf524f591115c190c320cb45e76bbea282d1cbad4cc10443d5a29a6619f2fa0cb9c38b2a144404a21b1139e5432189f1d5606ef993f687c5ba196b7c35adfcf0a33e47f7b760113e26c3feff1efc501b5310ddfd2b8ba33b7", 0x490}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) [ 2184.476927][T25025] jfs_mount failed w/return code = -22 [ 2184.609724][T25025] loop3: detected capacity change from 0 to 386 [ 2184.618306][T25025] jfs_mount: Mount Failure: superblock is corrupt! [ 2184.627188][T25025] Mount JFS Failure: -22 [ 2184.672762][T25025] jfs_mount failed w/return code = -22 08:11:08 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000003", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:08 executing program 2: r0 = socket$inet6(0x18, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x80, 0x0, 0x0) 08:11:08 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x1000, 0x0, 0x0) 08:11:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)}, 0x0) 08:11:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_int(r0, 0xffff, 0x1, 0x0, 0x0) 08:11:08 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_timeval(r0, 0xffff, 0x1005, &(0x7f0000000040)={0x0, 0x7ffffffb}, 0x10) 08:11:08 executing program 4: r0 = socket(0x18, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000500)=@un=@file={0x0, './file0\x00'}, 0xa, 0x0, 0x0, &(0x7f0000003580)=[{0xf8, 0x0, 0x0, "17eb0d1018fedb2a1e44ea7ce86c64e47900be2b01d18493ffb054023c3c31a4e50ab27895a4a4c9670b363ddcc7d5a5aa374f8fde4ab7bd1ba3c61e3f0c5caa8559ec0c65951547469ca19e1f1d54fd580bd0cc5e7d988ddf4565fa5ebb76eb858eaf0614abd3f7d6735a5d4fb0efa82176653b13b128ceb2d4ef319ac16ecf06a5048cee7cd6f94211850df3161c66097b23b27f6c1af8267c3eea6ec60d296fd094335d64b95d9dd00f727b7929a03b9d911e2d9f2a4966a9d0f3a324fb498d0ab2f44827b5fa359d5a2809ded1f96334c90619e38a3e4ebc46f39dc462172b"}, {0xc0, 0x0, 0x0, "228c1d3530900f8386892de61223500eca8693a27cdd14ec433b0c5b6fa2316f28edd70c4d8a5887e852477524424070b30bc68a0c06375154e647f48857e75c2538af6ee2546ef5904ce4b40fc11da4697317b7708e57e2a99ea9d27915a0d2cb8c237f8890fcd30bb7cc832c3f846b50d483a977a40426f8d943486b9f9c87f3a7d7a2291b9224678a4ada0b3fee0633bdabaa32b5229fae25d32f04806fa209e632a3821551f8c7"}, {0x110, 0x0, 0x0, "f1e8b7985e6638aa97c2d6933c31103ae768cfabd1614d78564ef232b338125e44f670002f97a73ded14fe74d10f8ae9044874e31c5808b81c2c9d77588d186b547fcdcfba56e080e5c04dde65380568b845902fd63eeb5d0a3db334438dd6f75659146abeb826ca7d47b2d8a31fbb5903bd23a627dca262d4362a137ee99dbaaeda97dde3a03b4e775245602ee5314742b951511f0ffdb969e740ecfe05a2505e68e3bccc5fdd1c450327bf8584d4bb9001aee2e48bfea9a6d4e64ff4233167a540429651a5083d77545828351675ed51aa4f00894b7b6c9126c96144522080b6763e95120763674e59e8beee3230da8ad95caf6e7b47ebc8"}, {0x540, 0x0, 0x0, "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"}], 0x808}, 0x0) 08:11:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x1002, 0x0, 0x0) 08:11:08 executing program 0: mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x6) 08:11:08 executing program 2: mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0) r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x2, 0x0) fcntl$setown(r0, 0x6, 0x0) 08:11:08 executing program 4: r0 = socket$inet6(0x18, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0x6c, 0x0, 0x0) [ 2185.130412][T25064] loop3: detected capacity change from 0 to 386 08:11:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000017c0)={&(0x7f0000000000)=@abs={0x0, 0x0, 0x3}, 0x8, &(0x7f00000016c0)=[{&(0x7f00000002c0)="787f18972fbf4b9734512298ee1966c9076079cb1e072be0000000000000", 0x1a}, {&(0x7f0000001880)="ed7fcffa27ae51c6364436f17770db3079f0800d92df82086938a1e6f0115316eeab7634a04c8a024532fbbac452b78529de24767cdc5b5ceaecfaba8ff5eb34e4f0cac1738687803f134cc1fc0205b8555ec7e0f0ca895e12f45246842d83511c07bddd15f8d2c0b7255ab0095c292d0f157e56f9fccb9f007522096765766a2b5b6a2698b275910c80052625efd236cf67fc25948054c108319dc35d3ebfa1f8364ddf00194e769658506b725093234f80332fbb67b50084da6818cdb004ae1b26a519aaf4dcb5f50ba14aca32", 0xce}, {&(0x7f0000000140)="f2bece43bbc6f8a2d7952ab3b8fa65bb7fac3205680710e3453b2361e05818a05ab55cc556447df78bd6786f60513a7ba7936daf1928c8dba4281e7c1ed8d57a222ded66c7e7a6fdb37ff27fe512b979cf50eafc7db7bcf41e076390e3782e0f1fe7cff30de6ba221a66f96e83d7fdb798acddbc1851f19b7fb1ac28ac87fde9f8b754c66d73f405600795ccd5503de9da10ea480a9b2da3b3bb6e439cd54a3742191df31cb65caf", 0xa8}, {&(0x7f0000001980)="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", 0x1010}, {&(0x7f0000001300)="b9c648dffe418ef95a9d71e7d0dcf0fe483d9f4619c41cb69d616d26436d2bc194f74717cd3021d7c6b0c351ddd8297df2c06ecf6b6f0525a7bbd01b57c7ceda72796d015bbda53d11121ec19353330b7263fcd199ae39804224008de1b519e56ad38d13ea6e014bd531d6f59de5f9c3b9c4c3b6e3eec64b80ae1ea9527a39c1e9a185c8421adf60958db77316d5e17c47ea3c24145dd65b6eb59a46d1af79", 0x9f}, {&(0x7f0000000480)="cdafca677ce56561c007f8d49094c743c629991f69a71f853dbc6c149115eed645ec65803ea462e5f2a1744eeeca8095037cc14e8f2ea3a78a3a398bfd175976a19ca60948d0a1c6b331958c0ef17533636351be11b22d131477624dcf74cdbbff687de0dd402e5713c09fcfc8359cda16e8e3d704bc62cb601224beb2742e111b1b32fe966a7d75333e4efb0aa93ff81ce191a15c40f41da3f2a26707da5d3254c08d7fa21d0c523a659be0b5174bfbf251c86631ac315601529884148b57a0ffb751639fd2195b", 0xc8}, {&(0x7f00000014c0)="a24a439068794212ebdcf1ef3c380050b98019e571f77e845bbd0c57dfafdbaad4a2ecea8298c7812f0023ec9e9e065752bd3d74af15312beb4ca333e5d6e3d51ccf3d2a4e92b02f63472199024c2f170e47cecfceb7e3d46865193ed4d7de34384962db8ee32f9f00057d72527c33052348ba2679b30700538a6499bd16b1e96804da0dfebb8db933abf6901bb9baa4f93887516deebeff4e5545273e1a64fe81657e1cbabee29520ecef1188910d9130d3492471f9a90d498a204f943109dbbca51c66348528119c81c5e639e8efdb628beaeaccece0697b2f7a25137251d7132917f4e8", 0xe5}, {&(0x7f00000015c0)="d934ec03e825b015fd7f6fde94dbf193575f8c49a23dd22e89825cc8f7e7197c6d1a3c33878126ff1163df3bd77f467333c2a3a1b38e15d8793773da534062ed8a804cc727fa23a278ae14665783f485276c12350a6031598a5e2fa17081aee0646c8ec83473b898ee013a11b7627c1e30ae1c536ff7ea1511d2009392849bd29bb3e5c85c7d2a586dfa32046056264a7e609b0b29c59308e7a090a5629ec765d6aff81a3403e86062461ba2daad86f4351810575022", 0xb6}, {&(0x7f0000001680)="8de0cb179687dd68f574cb64fa87799097545561a72463d4c44fd40429065c7ffa53de27eebbf79c782ec8d9cf6b95d9d3ff9207d1", 0x35}], 0x100000000000032a, &(0x7f00000002c0)}, 0x0) [ 2185.260437][T25064] jfs_mount: Mount Failure: superblock is corrupt! [ 2185.304344][T25064] Mount JFS Failure: -22 [ 2185.333565][T25064] jfs_mount failed w/return code = -22 [ 2185.411835][T25064] loop3: detected capacity change from 0 to 386 [ 2185.477963][T25064] jfs_mount: Mount Failure: superblock is corrupt! [ 2185.498219][T25064] Mount JFS Failure: -22 [ 2185.507147][T25064] jfs_mount failed w/return code = -22 08:11:08 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000004", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:08 executing program 0: r0 = socket$inet(0x2, 0x3, 0x0) getsockopt$sock_int(r0, 0xffff, 0x1003, 0x0, 0x0) 08:11:08 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r0, 0xffff, 0x1002, 0x0, 0x0) 08:11:08 executing program 1: r0 = socket$inet6(0x18, 0x2, 0x0) getsockopt$sock_int(r0, 0xffff, 0x1, 0x0, 0x0) 08:11:08 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) fcntl$lock(r0, 0x8, 0x0) 08:11:08 executing program 5: r0 = socket(0x18, 0x3, 0x0) getsockopt$sock_timeval(r0, 0xffff, 0x1005, 0x0, 0x0) 08:11:09 executing program 2: symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='.\x00') 08:11:09 executing program 1: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000000000), 0x10) 08:11:09 executing program 4: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) 08:11:09 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_int(r0, 0xffff, 0x1004, &(0x7f00000002c0), &(0x7f0000000300)=0x4) [ 2185.955619][T25099] loop3: detected capacity change from 0 to 386 [ 2185.983733][T25099] jfs_mount: Mount Failure: superblock is corrupt! [ 2185.991704][T25099] Mount JFS Failure: -22 [ 2185.996142][T25099] jfs_mount failed w/return code = -22 08:11:09 executing program 2: mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x8000, 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 08:11:09 executing program 4: r0 = socket$inet6(0x18, 0x3, 0x0) setsockopt$sock_int(r0, 0xffff, 0x800, 0x0, 0x0) [ 2186.084122][T25099] loop3: detected capacity change from 0 to 386 [ 2186.104699][T25099] jfs_mount: Mount Failure: superblock is corrupt! [ 2186.173240][T25099] Mount JFS Failure: -22 [ 2186.212704][T25099] jfs_mount failed w/return code = -22 08:11:09 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000005", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:09 executing program 0: readv(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffdd3) 08:11:09 executing program 2: socketpair(0x1, 0x3, 0x10, 0x0) 08:11:09 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0x69, 0x0, 0x0) 08:11:09 executing program 5: r0 = socket$inet6(0x18, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x10, 0x0, 0x0) 08:11:09 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.\x00') 08:11:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x1004, 0x0, 0x0) 08:11:09 executing program 1: mknod(&(0x7f00000001c0)='./file0\x00', 0x8000, 0x800) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$TIOCMGET(r1, 0x4004746a, &(0x7f0000000180)) 08:11:09 executing program 0: open(&(0x7f0000000000)='./file0\x00', 0x82c0, 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x0, 0xfffffffffffffffe}}, 0x0) 08:11:09 executing program 2: mlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) munlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) [ 2186.641184][T25131] loop3: detected capacity change from 0 to 386 08:11:10 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) bind$unix(r0, 0x0, 0x0) 08:11:10 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1005, 0x0, 0x0) [ 2186.815186][T25131] jfs_mount: Mount Failure: superblock is corrupt! [ 2186.852057][T25131] Mount JFS Failure: -22 [ 2186.856847][T25131] jfs_mount failed w/return code = -22 [ 2186.896490][T25131] loop3: detected capacity change from 0 to 386 [ 2186.905724][T25131] jfs_mount: Mount Failure: superblock is corrupt! [ 2186.914856][T25131] Mount JFS Failure: -22 [ 2186.922281][T25131] jfs_mount failed w/return code = -22 08:11:10 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000006", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setregid(0x0, r1) setregid(0x0, 0xffffffffffffffff) 08:11:10 executing program 4: r0 = socket(0x18, 0x4003, 0x0) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 08:11:10 executing program 2: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) 08:11:10 executing program 5: r0 = socket$inet6(0x18, 0x3, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000010c0)={0x18, 0x3}, 0xc) 08:11:10 executing program 0: mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) munlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) 08:11:10 executing program 4: r0 = socket(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x13, 0x0, 0x0) 08:11:10 executing program 2: mknod(&(0x7f0000000040)='./file1\x00', 0x8000, 0x0) rename(&(0x7f00000000c0)='.\x00', &(0x7f0000000080)='./file1\x00') 08:11:10 executing program 1: open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) utimes(&(0x7f0000000080)='./file0\x00', 0x0) [ 2187.216959][T25161] loop3: detected capacity change from 0 to 386 08:11:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x4, &(0x7f0000000000), 0x4) 08:11:10 executing program 2: mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4) 08:11:10 executing program 5: r0 = socket(0x2, 0x1, 0x0) getsockopt$sock_int(r0, 0xffff, 0x200, 0x0, 0x0) [ 2187.319417][T25161] jfs_mount: Mount Failure: superblock is corrupt! [ 2187.360182][T25161] Mount JFS Failure: -22 [ 2187.364931][T25161] jfs_mount failed w/return code = -22 [ 2187.430230][T25161] loop3: detected capacity change from 0 to 386 [ 2187.446909][T25161] jfs_mount: Mount Failure: superblock is corrupt! [ 2187.473142][T25161] Mount JFS Failure: -22 [ 2187.520640][T25161] jfs_mount failed w/return code = -22 08:11:10 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000007", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:10 executing program 4: munmap(&(0x7f0000ff3000/0x3000)=nil, 0x3000) munmap(&(0x7f0000fee000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ff3000/0x4000)=nil, 0x4000, 0x0) 08:11:10 executing program 1: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1000, 0x2) 08:11:10 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r0, 0xffff, 0x1008, 0x0, 0x0) 08:11:10 executing program 5: r0 = socket(0x18, 0x1, 0x0) bind(r0, &(0x7f0000000040)=@in6={0x18, 0x3}, 0xc) 08:11:10 executing program 2: shmat(0x0, &(0x7f0000ffb000/0x2000)=nil, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x4000)=nil, 0x0) 08:11:11 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001680), 0x81, 0x0) write(r0, &(0x7f0000000000)="e3", 0x1) 08:11:11 executing program 4: getgroups(0x5e, &(0x7f0000000040)) 08:11:11 executing program 0: clone(0xa912d700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) clone(0x6300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prlimit64(0x0, 0x0, &(0x7f0000000080), 0x0) capget(0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setitimer(0x0, &(0x7f0000000000)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:11:11 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000100)={[0xfffffffffffe]}, 0x0, 0x8) clone(0x20204780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = gettid() tgkill(r0, r1, 0x24) r2 = gettid() r3 = gettid() tgkill(r2, r3, 0x24) ppoll(0x0, 0xffffffffffffff3d, 0x0, &(0x7f00000000c0), 0x8) 08:11:11 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$sock_int(r0, 0xffff, 0x8, 0x0, 0x0) [ 2187.958942][T25196] loop3: detected capacity change from 0 to 386 08:11:11 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_int(r0, 0xffff, 0x1007, 0x0, 0x0) [ 2188.087555][T25196] jfs_mount: Mount Failure: superblock is corrupt! [ 2188.164919][T25196] Mount JFS Failure: -22 [ 2188.216804][T25196] jfs_mount failed w/return code = -22 [ 2188.324901][T25196] loop3: detected capacity change from 0 to 386 [ 2188.343598][T25196] jfs_mount: Mount Failure: superblock is corrupt! [ 2188.359046][T25196] Mount JFS Failure: -22 [ 2188.371024][T25196] jfs_mount failed w/return code = -22 08:11:11 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000008", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:11 executing program 2: accept(0xffffffffffffffff, &(0x7f0000000040)=@in6, 0x0) 08:11:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat(r0, &(0x7f0000000180)='./file0\x00', 0x200, 0x0) ioctl$FIONREAD(r0, 0x4004667f, &(0x7f0000000040)) 08:11:11 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f00000000c0)=@gcm_128={{}, "24c8dd395fc01fa1", "fb092bf0a98eee7cedd65a74e72afb89", "3bfaf4ac", "9b60672acb45ecd9"}, 0x28) 08:11:11 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x12) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) syz_emit_ethernet(0x3b, &(0x7f00000003c0)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x6, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3, 0xfe}]}}, {"d0"}}}}}}, 0x0) 08:11:11 executing program 5: clone(0x4300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) listen(r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setitimer(0x0, &(0x7f0000000040)={{}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:11:12 executing program 2: clone(0xa912d700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000080), 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x2000204d5fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = creat(&(0x7f00000013c0)='./file0\x00', 0x0) ftruncate(r1, 0x7fffffff) 08:11:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, 0x0, &(0x7f0000000300)) 08:11:12 executing program 4: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000100)={0x6}, &(0x7f0000000140)={0x0, 0x3938700}, 0x0) 08:11:12 executing program 0: clone(0x2000000080204500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000)) ptrace(0x10, r1) ptrace$getsig(0x4201, r0, 0x0, 0x0) [ 2188.780944][T25230] loop3: detected capacity change from 0 to 386 [ 2188.814100][T25230] jfs_mount: Mount Failure: superblock is corrupt! [ 2188.821252][T25230] Mount JFS Failure: -22 [ 2188.826686][T25230] jfs_mount failed w/return code = -22 08:11:12 executing program 2: clone(0xa912d700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp(0x2, 0x2, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) clone(0x6300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) umount2(0x0, 0x9) prlimit64(0x0, 0x0, &(0x7f0000000080), 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = dup3(r0, r1, 0x0) preadv(r3, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, &(0x7f0000000000)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:11:12 executing program 5: clone(0xa912d700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) clone(0x6300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prlimit64(0x0, 0x0, &(0x7f0000000080), 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mremap(&(0x7f0000330000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f000057e000/0x4000)=nil) setitimer(0x0, &(0x7f0000000000)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 2188.968947][T25230] loop3: detected capacity change from 0 to 386 [ 2188.981075][T25230] jfs_mount: Mount Failure: superblock is corrupt! [ 2189.005738][T25230] Mount JFS Failure: -22 [ 2189.010336][T25230] jfs_mount failed w/return code = -22 08:11:12 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x210002, 0x0) preadv(r0, 0x0, 0x0, 0x0, 0x0) rt_sigreturn() 08:11:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = eventfd2(0x4, 0x80000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000200), 0x2, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x200004) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) 08:11:12 executing program 4: poll(0x0, 0x0, 0xe5) clone(0x2000411cf7c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) clone(0x106300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigreturn() timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) mount(&(0x7f0000000100)=@nullb, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='anon_inodefs\x00', 0x400, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x16, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 08:11:12 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000009", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:12 executing program 2: getrlimit(0x8, &(0x7f0000000000)) 08:11:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0x1d, &(0x7f0000000340)={@in6={{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}}, 0x0, 0x0, 0x0, 0x0, "a9d7bab61ae9da31d6c09d3a99eb7a07e2bf9e27ba44e01f689539dc1b794bdc35c6cb0458486bb200e1745ff2454e1814e6c7cd1796377355bd41ae5ce7872c5078bd982b9b06fb77363b9d30bebd62"}, 0xd8) 08:11:12 executing program 0: openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x4300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0xd9f, 0x0) clone(0x0, 0x0, &(0x7f0000000080), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setitimer(0x0, &(0x7f0000000000)={{0x0, 0xea60}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 2189.332089][T25262] loop3: detected capacity change from 0 to 386 08:11:12 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv(r1, 0x0, 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_sigreturn() 08:11:12 executing program 2: clone(0x4300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) ftruncate(r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setitimer(0x0, &(0x7f0000000040)={{}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:11:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x4300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f00000001c0)="02e9008f001171730bb92e2135ccfe79", 0x10}], 0x1) setitimer(0x0, &(0x7f0000000000)={{0x0, 0xea60}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:11:12 executing program 4: clone(0x4300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000006100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000006240)=[{&(0x7f0000006140)=@abs, 0x6e, 0x0}], 0x301, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setitimer(0x0, &(0x7f0000000040)={{}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 2189.502278][T25262] jfs_mount: Mount Failure: superblock is corrupt! [ 2189.539000][T25262] Mount JFS Failure: -22 [ 2189.543496][T25262] jfs_mount failed w/return code = -22 [ 2189.602812][T25262] loop3: detected capacity change from 0 to 386 [ 2189.631859][T25262] jfs_mount: Mount Failure: superblock is corrupt! [ 2189.649042][T25262] Mount JFS Failure: -22 [ 2189.653495][T25262] jfs_mount failed w/return code = -22 08:11:13 executing program 5: poll(0x0, 0x0, 0xfd) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f0000002680)='./file0\x00', 0x108) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4602010100000000800000000003003e0000000000400000000000f300400000000000000000000000000000000000002000003800010000000000000001000000269244afe9807c16000040f60300000000000000df29fd20ef249f6cb106cc227e5f344d9a37b01d8c3d7102a30a490679f719be037d834b9c6407b8c097aae51731c0e30665e5b76e96feafd73b02d0ebe85f98d684ab4940427dd2f2cc08b2551ae5be28b37f2b22fadeae9b", @ANYRES64], 0x78) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0) 08:11:13 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000a", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:13 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f00000000c0)={'dummy0\x00'}) 08:11:13 executing program 0: clone(0x20022004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000000), 0x4) rt_sigreturn() 08:11:13 executing program 4: clone(0x4300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0xd9f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) syncfs(r1) setitimer(0x0, &(0x7f0000000000)={{0x0, 0xea60}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:11:13 executing program 2: clone(0xa912d700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp(0x2, 0x2, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = dup2(r0, r1) accept4(r3, 0x0, &(0x7f0000002400), 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, &(0x7f0000000000)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:11:13 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x4300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000240)=[{&(0x7f00000001c0)="02", 0x1}], 0x1) setitimer(0x0, &(0x7f0000000000)={{0x0, 0xea60}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140), 0x0) 08:11:13 executing program 1: clone(0xa912d700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) clone(0x6300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prlimit64(0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='gid_map\x00') read$FUSE(r1, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) capget(&(0x7f0000000080)={0x20080522, r2}, &(0x7f0000000000)) tkill(r2, 0x1f) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, &(0x7f0000000040), 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setitimer(0x0, &(0x7f0000000000)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:11:13 executing program 2: clone(0x20022004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x5, &(0x7f0000000000), 0x4) rt_sigreturn() 08:11:13 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x81800) rt_sigreturn() [ 2190.149874][T25303] loop3: detected capacity change from 0 to 386 08:11:13 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x4300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigqueueinfo(0xffffffffffffffff, 0x0, &(0x7f0000000040)) setitimer(0x0, &(0x7f0000000000)={{0x0, 0xea60}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 2190.213604][T25303] jfs_mount: Mount Failure: superblock is corrupt! [ 2190.220418][T25303] Mount JFS Failure: -22 [ 2190.224819][T25303] jfs_mount failed w/return code = -22 08:11:13 executing program 5: clone(0x20022004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) accept4(r0, 0x0, 0x0, 0x0) rt_sigreturn() 08:11:13 executing program 1: getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, &(0x7f0000000040)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f00000002c0)) [ 2190.314271][T25303] loop3: detected capacity change from 0 to 386 [ 2190.340622][T25303] jfs_mount: Mount Failure: superblock is corrupt! [ 2190.347188][T25303] Mount JFS Failure: -22 [ 2190.366622][T25303] jfs_mount failed w/return code = -22 08:11:13 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000b", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) clock_gettime(0x0, &(0x7f00000014c0)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000001440)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001080)=""/89, 0x59}}], 0x1, 0x2040, &(0x7f0000001500)={0x0, r1+60000000}) 08:11:13 executing program 0: clone(0xa912d700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) clone(0x6300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) umount2(0x0, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000080), 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setitimer(0x0, &(0x7f0000000000)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:11:14 executing program 4: clone(0xa912d700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp(0x2, 0x2, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r0, r1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) ppoll(&(0x7f0000000200)=[{}, {r1, 0x4c4}, {r2, 0xa}], 0x3, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, &(0x7f0000000000)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:11:14 executing program 2: clone(0xa912d700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) clone(0x6300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prlimit64(0x0, 0x0, &(0x7f0000000080), 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, &(0x7f0000000040), 0x3, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setitimer(0x0, &(0x7f0000000000)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:11:14 executing program 1: io_setup(0x2, &(0x7f0000000100)=0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x3, &(0x7f0000000840)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000080)="100000000100"/16, 0x10}]) 08:11:14 executing program 0: clone(0xa912d700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp(0x2, 0x2, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = dup2(r0, r1) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, &(0x7f0000000000)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) fstatfs(r3, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:11:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x4300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) setitimer(0x2, &(0x7f0000000000)={{0x0, 0xea60}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 2191.001786][T25341] loop3: detected capacity change from 0 to 386 08:11:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x4300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) writev(0xffffffffffffffff, 0x0, 0x0) setitimer(0x0, &(0x7f0000000000)={{0x0, 0xea60}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000180)) 08:11:14 executing program 1: clone(0x4300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) pipe(0x0) setsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000000040)={@multicast2, @dev}, 0xc) setitimer(0x0, &(0x7f0000000040)={{}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 2191.168141][T25341] jfs_mount: Mount Failure: superblock is corrupt! [ 2191.214996][T25341] Mount JFS Failure: -22 [ 2191.242064][T25341] jfs_mount failed w/return code = -22 08:11:14 executing program 5: clone(0x4300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mknodat(r0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) setitimer(0x0, &(0x7f0000000040)={{}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:11:14 executing program 2: syz_emit_ethernet(0x42, &(0x7f0000000000)={@link_local, @empty, @void, {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @multicast, @private2, @multicast, @dev}}}}, 0x0) [ 2191.344952][T25341] loop3: detected capacity change from 0 to 386 [ 2191.357035][T25341] jfs_mount: Mount Failure: superblock is corrupt! [ 2191.366797][T25341] Mount JFS Failure: -22 [ 2191.373493][T25341] jfs_mount failed w/return code = -22 08:11:14 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000d", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:14 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) clone(0x4300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4), 0xc) setitimer(0x0, &(0x7f0000000000)={{0x0, 0xea60}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:11:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x4300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$netlink(0x10, 0x3, 0x0) pwrite64(r1, 0x0, 0x0, 0x0) setitimer(0x2, &(0x7f0000000000)={{0x0, 0xea60}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x10030100, &(0x7f0000000040), 0x0, 0x0, 0x0) 08:11:14 executing program 1: clone(0xa912d700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_icmp(0x2, 0x2, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setitimer(0x0, &(0x7f0000000000)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) fstatfs(0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:11:14 executing program 2: clone(0x4300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getdents(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syncfs(0xffffffffffffffff) setitimer(0x0, &(0x7f0000000000)={{0x0, 0xea60}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:11:15 executing program 1: semget(0x3, 0x0, 0xa03) 08:11:15 executing program 4: clone(0xa912d700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) clone(0x6300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prlimit64(0x0, 0x0, &(0x7f0000000080), 0x0) capget(&(0x7f0000000080)={0x20080522}, &(0x7f0000000000)) tkill(0x0, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setitimer(0x0, &(0x7f0000000000)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:11:15 executing program 0: clone(0xa912d700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) clone(0x6300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prlimit64(0x0, 0x0, &(0x7f0000000080), 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mremap(&(0x7f0000330000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f000057e000/0x4000)=nil) setitimer(0x0, &(0x7f0000000000)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:11:15 executing program 4: clone(0x6300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000012c0), 0x0, 0x0) clone(0x6300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigreturn() r1 = openat(0xffffffffffffffff, &(0x7f00000027c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) capset(&(0x7f0000001300)={0x19980330}, &(0x7f0000001340)) capset(&(0x7f0000000080)={0x20080522}, &(0x7f00000000c0)) setitimer(0x0, &(0x7f0000000000)={{0x0, 0xea60}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:11:15 executing program 2: clone(0xa912d700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setreuid(0x0, r2) mount$9p_tcp(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000002380)={'trans=tcp,', {}, 0x2c, {[], [{@fsmagic}]}}) setitimer(0x0, &(0x7f0000000000)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 2191.911466][T25382] loop3: detected capacity change from 0 to 386 [ 2192.082510][T25382] jfs_mount: Mount Failure: superblock is corrupt! [ 2192.130613][T25382] Mount JFS Failure: -22 [ 2192.142356][T25382] jfs_mount failed w/return code = -22 [ 2192.244610][T25382] loop3: detected capacity change from 0 to 386 [ 2192.262749][T25382] jfs_mount: Mount Failure: superblock is corrupt! [ 2192.295334][T25382] Mount JFS Failure: -22 [ 2192.302112][T25382] jfs_mount failed w/return code = -22 08:11:15 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000002680)=[{&(0x7f0000001540)=""/221, 0xdd}], 0x1, 0x2, 0x0) 08:11:15 executing program 1: getrandom(&(0x7f0000000040)=""/4096, 0x1000, 0x0) getrandom(&(0x7f0000000000)=""/30, 0x1e, 0x0) 08:11:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f000000b680)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007c80)=[{&(0x7f0000007980)=""/229, 0xe5}], 0x1}}], 0x2, 0x0, &(0x7f000000b8c0)={0x0, 0x3938700}) 08:11:15 executing program 0: ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x4300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_icmp(0x2, 0x2, 0x1) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)) setitimer(0x0, &(0x7f0000000100)={{}, {0x0, 0x2710}}, 0x0) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000002cc0)) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000005b80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006f40)={0x0, 0x0, &(0x7f0000006e80)=[{&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x70bd2b}, 0x10}, {0x0}, {0x0}, {0x0, 0x288}, {0x0}], 0x5, 0x0, 0x0, 0x4184}, 0x8001) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:11:15 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) 08:11:15 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000e", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:15 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000080)={'mangle\x00'}, &(0x7f0000000000)=0x54) 08:11:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x4300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000100)) lstat(&(0x7f0000000140)='.\x00', 0x0) setitimer(0x0, &(0x7f0000000000)={{0x0, 0xea60}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:11:15 executing program 0: clone(0xa912d700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) capget(&(0x7f0000000080)={0x20080522}, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setitimer(0x0, &(0x7f0000000000)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 08:11:15 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, r2) socket$inet_tcp(0x2, 0x1, 0x0) fstat(0xffffffffffffffff, 0x0) setreuid(0xee00, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_sigreturn() 08:11:16 executing program 2: r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/vm/compact_memory\x00', 0x1, 0x0) ftruncate(r0, 0x0) [ 2192.712996][T25416] loop3: detected capacity change from 0 to 386 08:11:16 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 08:11:16 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010e00)="513521150000000000100000000000000b000000000000000d0000001000000012000000000000000100000002000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000030000000b00000005000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f000001", 0xa9, 0x200000}, {&(0x7f0000010f00)="000000000000000000000000000000000000000000000000000000002c1b39b8", 0x20, 0x200fe0}, {&(0x7f0000011000)="000000000000000000000000000000000000000000000000000000060000000000020c600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000010000000510ec000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000002", 0xba, 0x2011e0}, {&(0x7f0000011100)="0000000000000003000000040078000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000005", 0x56, 0x2012e0}, {&(0x7f0000011200)='\x00\x00\x00\v', 0x4, 0x201380}, {&(0x7f0000011800)="0000000000000000000000000000000000000000000000000000000100000000513521150000000000100000000000000b000000000000000d0000001000000012000000000000000100000002000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000030000000b00000005000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f000001", 0xc9, 0x204fe0}, {&(0x7f0000011900)="000000000000000000000000000000000000000000000000000000002c1b39b8", 0x20, 0x205fe0}, {&(0x7f0000011a00)="513521152c1b39b8", 0x8, 0x3ff000}, {&(0x7f0000011b00)="0000000000000000fe", 0x9, 0x3ff040}, {&(0x7f0000012a00)="00000000000000000000010000000100000000020000000100000000030000000110", 0x22, 0xa00000}, {&(0x7f0000012e00)="000000000000000003", 0x9, 0x1001fe0}], 0x0, &(0x7f0000014500)) 08:11:16 executing program 0: openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0xca400, 0x0) 08:11:16 executing program 4: openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000002c80), 0x1c0102, 0x0) [ 2192.890702][T25416] jfs_mount: Mount Failure: superblock is corrupt! [ 2192.971140][T25416] Mount JFS Failure: -22 [ 2192.977978][T25416] jfs_mount failed w/return code = -22 08:11:16 executing program 2: r0 = syz_open_dev$cec(&(0x7f0000000480), 0x2, 0x2) ioctl$VIDIOC_QUERYBUF(r0, 0x8044610a, 0x0) 08:11:16 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='flush']) mkdirat(r0, &(0x7f0000000100)='./file0\x00', 0x0) [ 2193.165895][T25434] loop1: detected capacity change from 0 to 65567 [ 2193.228895][T25434] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 2193.236659][T25416] loop3: detected capacity change from 0 to 386 [ 2193.245516][T25434] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock [ 2193.267334][T25416] jfs_mount: Mount Failure: superblock is corrupt! [ 2193.276627][T25434] F2FS-fs (loop1): invalid crc_offset: 0 [ 2193.331553][T25416] Mount JFS Failure: -22 [ 2193.385334][T25416] jfs_mount failed w/return code = -22 [ 2193.410424][T25434] F2FS-fs (loop1): Found nat_bits in checkpoint [ 2193.494176][T25434] F2FS-fs (loop1): sanity_check_inode: corrupted inode i_blocks i_ino=3 iblocks=0, run fsck to fix. 08:11:16 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000f", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:16 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x20000009}, 0x0) sched_setattr(0x0, &(0x7f0000000200)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) r2 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240), 0x40, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) io_submit(0x0, 0x4, &(0x7f00000006c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x5, 0x3, r1, &(0x7f0000000100)="691fd89f7be2e35201958bc0b26a38c34e4d06a4901721fede7b7428834f7a9154a07aa86aa7a63ea8f7a8f65f0a9b3639a6ddcdfc8f", 0x36}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x6, 0xb4f, 0xffffffffffffffff, 0x0, 0x0, 0x800, 0x0, 0x3}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0xa04, r2, &(0x7f00000004c0)="e59664a81f009ab91e5b79ca550df532f8c4b0eef9d0603533bc9cf45ab134ea82435752b916b0a7d16956dd0f3e40362c312f3457764ceea9240b9415ab0420c2404ccd98fc336dcd0d404c7db21535f869ddf1da5725d6fd006f6c8b7eb9c070d7444c7ddbdb92029db3d1bc851a78b1d137987db42bfb5752c0be9ca2a7ccf2b565cae22c336df81655dcd8adbc9953072915fb361983e88789db7c2ec98cf1c215b1c581617eb29b3aee63764933e904454d24b372bae0e1b04c946dec28e797e8c02ca797192ede9f", 0xcb, 0xfffffffffffffac5, 0x0, 0x1}, 0x0]) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) sendto$inet6(r0, &(0x7f0000000200)="03", 0x7ffff000, 0x40080, 0x0, 0x1f4) pread64(0xffffffffffffffff, 0x0, 0x0, 0x1000) ioctl$VIDIOC_SUBDEV_G_SELECTION(0xffffffffffffffff, 0xc040563d, &(0x7f0000000000)={0x1, 0x0, 0x101, 0xf, {0xfff, 0x2, 0xa1ea, 0x10000}}) 08:11:16 executing program 4: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000140), 0x40202, 0x0) write$binfmt_aout(r0, &(0x7f0000000a00)={{}, "", ['\x00', '\x00']}, 0x220) 08:11:16 executing program 2: socket(0x11, 0x3, 0x7f) 08:11:16 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x800000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000440), 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) io_getevents(r3, 0x6, 0x6, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}], 0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}]) [ 2193.557764][T25434] F2FS-fs (loop1): Failed to read root inode 08:11:17 executing program 1: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x2022}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_mount_image$ubifs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 08:11:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000001c0)={'tunl0\x00', &(0x7f0000000280)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @multicast2, @multicast2}}}}) 08:11:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(r0, 0x0, 0x0) 08:11:17 executing program 0: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) [ 2193.951020][T25461] loop3: detected capacity change from 0 to 386 08:11:17 executing program 5: clock_gettime(0x6, &(0x7f00000003c0)) 08:11:17 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x38, r3, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}]}]}, 0x38}}, 0x0) [ 2194.069539][T25461] jfs_mount: Mount Failure: superblock is corrupt! [ 2194.076513][T25461] Mount JFS Failure: -22 [ 2194.082793][T25461] jfs_mount failed w/return code = -22 08:11:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x20080801) [ 2194.152330][T25461] loop3: detected capacity change from 0 to 386 [ 2194.192949][T25474] fuse: Bad value for 'fd' [ 2194.216786][T25461] jfs_mount: Mount Failure: superblock is corrupt! [ 2194.302638][T25461] Mount JFS Failure: -22 [ 2194.370392][T25461] jfs_mount failed w/return code = -22 08:11:17 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000010", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:17 executing program 2: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00'}) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 08:11:17 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:11:17 executing program 1: syz_usb_connect(0x0, 0x24, &(0x7f00000000c0)=ANY=[@ANYBLOB="1201000066230f40ef170372dde1000000010902"], 0x0) 08:11:17 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSGCAUSE(r0, 0x89e0, &(0x7f0000000040)) 08:11:18 executing program 0: socketpair(0x1a, 0x0, 0x0, &(0x7f0000005240)) 08:11:18 executing program 2: getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, 0x0, 0x0) 08:11:18 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x2f, &(0x7f0000000140)="c4c691219919da0709921456b3bde0ec638c3aebdef506eca593b01aa2933bba66409fe0ed6030312b6a190893480b"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:11:18 executing program 5: openat$nvme_fabrics(0xffffffffffffff9c, 0xfffffffffffffffc, 0x0, 0x0) [ 2194.854698][T25495] loop3: detected capacity change from 0 to 386 [ 2194.878973][T25495] jfs_mount: Mount Failure: superblock is corrupt! [ 2194.885751][T25495] Mount JFS Failure: -22 [ 2194.892243][T25495] jfs_mount failed w/return code = -22 08:11:18 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) 08:11:18 executing program 4: syz_mount_image$pvfs2(&(0x7f0000004940), &(0x7f0000004980)='./file0\x00', 0x0, 0x0, 0x0, 0xc, &(0x7f0000004d00)) 08:11:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x5}]}]}, 0x58}}, 0x0) [ 2195.029473][ T6862] usb 2-1: new high-speed USB device number 75 using dummy_hcd [ 2195.051670][T25495] loop3: detected capacity change from 0 to 386 [ 2195.068050][T25495] jfs_mount: Mount Failure: superblock is corrupt! [ 2195.080455][T25495] Mount JFS Failure: -22 [ 2195.084908][T25495] jfs_mount failed w/return code = -22 08:11:18 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000031", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:18 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) 08:11:18 executing program 2: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xa6540, 0xc6) [ 2195.293865][T25515] ERROR: device name not specified. [ 2195.424725][T25519] loop3: detected capacity change from 0 to 386 [ 2195.459707][ T6862] usb 2-1: config 0 has no interfaces? [ 2195.465874][ T6862] usb 2-1: New USB device found, idVendor=17ef, idProduct=7203, bcdDevice=e1.dd [ 2195.549267][ T6862] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2195.571923][T25519] jfs_mount: Mount Failure: superblock is corrupt! [ 2195.584456][ T37] audit: type=1800 audit(1620029478.899:142): pid=25521 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=15879 res=0 errno=0 [ 2195.617235][T25519] Mount JFS Failure: -22 [ 2195.637253][ T6862] usb 2-1: config 0 descriptor?? [ 2195.638791][T25519] jfs_mount failed w/return code = -22 [ 2195.722665][T25519] loop3: detected capacity change from 0 to 386 [ 2195.773335][T25519] jfs_mount: Mount Failure: superblock is corrupt! [ 2195.794464][T25519] Mount JFS Failure: -22 [ 2195.800465][T25519] jfs_mount failed w/return code = -22 08:11:19 executing program 1: madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xb) 08:11:19 executing program 0: syz_mount_image$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x42900, 0x10) 08:11:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xffffffffffffff37) 08:11:19 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000009d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 08:11:19 executing program 5: r0 = getpgid(0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000000)=0x2800000000) 08:11:19 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000036", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) [ 2195.905234][ T9383] usb 2-1: USB disconnect, device number 75 08:11:19 executing program 4: semget$private(0x0, 0x4, 0x184) 08:11:19 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) statx(r0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0) 08:11:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) 08:11:19 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000003540), 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, 0x0, 0x0) [ 2196.163191][T25547] loop3: detected capacity change from 0 to 386 08:11:19 executing program 4: fchownat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400) 08:11:19 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) read$FUSE(r0, 0x0, 0xffffffffffffff78) 08:11:19 executing program 1: mknodat$null(0xffffffffffffffff, &(0x7f0000001240)='./file0\x00', 0x0, 0x103) [ 2196.275582][T25547] jfs_mount: Mount Failure: superblock is corrupt! [ 2196.331094][T25547] Mount JFS Failure: -22 [ 2196.335944][T25547] jfs_mount failed w/return code = -22 08:11:19 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) [ 2196.434286][T25547] loop3: detected capacity change from 0 to 386 [ 2196.460243][T25547] jfs_mount: Mount Failure: superblock is corrupt! [ 2196.519219][T25547] Mount JFS Failure: -22 08:11:19 executing program 4: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x440, 0x0) 08:11:19 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) read$FUSE(r0, 0x0, 0xffffff47) [ 2196.586818][T25547] jfs_mount failed w/return code = -22 08:11:20 executing program 5: pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, 0x0, 0x0) 08:11:20 executing program 0: openat$incfs(0xffffffffffffff9c, &(0x7f00000001c0)='.log\x00', 0x42340, 0x118) 08:11:20 executing program 1: syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000140)) 08:11:20 executing program 2: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000140)='.log\x00', 0x101040, 0x0) connect$netlink(r0, 0x0, 0x0) 08:11:20 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000003c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:20 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000009d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000009d40)) 08:11:20 executing program 2: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.pending_reads\x00', 0x20040, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, 0x0) 08:11:20 executing program 4: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xa242, 0x19c) 08:11:20 executing program 0: fchownat(0xffffffffffffff9c, &(0x7f0000000140)='.\x00', 0xee00, 0x0, 0x1000) 08:11:20 executing program 1: syz_mount_image$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2, 0x0) [ 2197.092047][T25589] loop3: detected capacity change from 0 to 386 08:11:20 executing program 0: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x80000000) [ 2197.257399][T25589] jfs_mount: Mount Failure: superblock is corrupt! [ 2197.323042][T25589] Mount JFS Failure: -22 08:11:20 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x4e802, 0x0) write$char_usb(r0, 0x0, 0x0) [ 2197.360515][T25589] jfs_mount failed w/return code = -22 [ 2197.451716][T25589] loop3: detected capacity change from 0 to 386 [ 2197.483924][T25589] jfs_mount: Mount Failure: superblock is corrupt! [ 2197.495066][T25589] Mount JFS Failure: -22 [ 2197.502511][T25589] jfs_mount failed w/return code = -22 08:11:20 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xa6540, 0x0) utimensat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 08:11:20 executing program 0: symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:11:20 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 08:11:20 executing program 4: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0)={0x0}) 08:11:21 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000044", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:21 executing program 1: r0 = eventfd2(0xfff, 0x0) read$eventfd(r0, 0x0, 0x17) 08:11:21 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) 08:11:21 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x2, 0x1) 08:11:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x40089416, 0x0) 08:11:21 executing program 1: mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x600000e) [ 2198.032703][T25625] loop3: detected capacity change from 0 to 386 08:11:21 executing program 1: semctl$SEM_INFO(0x0, 0x3, 0x13, &(0x7f00000000c0)=""/196) 08:11:21 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$incfs(r0, &(0x7f0000000200)='.log\x00', 0x0, 0x0) [ 2198.188642][T25625] jfs_mount: Mount Failure: superblock is corrupt! [ 2198.226016][T25625] Mount JFS Failure: -22 [ 2198.243869][T25625] jfs_mount failed w/return code = -22 [ 2198.350480][T25625] loop3: detected capacity change from 0 to 386 [ 2198.397851][T25625] jfs_mount: Mount Failure: superblock is corrupt! [ 2198.501457][T25625] Mount JFS Failure: -22 [ 2198.534123][T25625] jfs_mount failed w/return code = -22 [ 2198.646030][ T37] audit: type=1800 audit(1620029481.959:143): pid=25635 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=15906 res=0 errno=0 08:11:22 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x80, 0x0) 08:11:22 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff}) sendto(r0, &(0x7f00000000c0)="a2", 0x1, 0x4, 0x0, 0xffffffffffffff4b) 08:11:22 executing program 2: clock_gettime(0x2, &(0x7f00000005c0)) 08:11:22 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000000)="a2", 0x1, 0x4040804, 0x0, 0x0) 08:11:22 executing program 0: mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2000009) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 08:11:22 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000051", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:22 executing program 4: semctl$SEM_INFO(0x0, 0x4, 0x13, &(0x7f0000000000)=""/199) 08:11:22 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) sendmsg$sock(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x4080) 08:11:22 executing program 2: openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000024c0), 0x2, 0x0) [ 2199.282467][T25660] loop3: detected capacity change from 0 to 386 08:11:22 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x4e802, 0x0) write$FUSE_CREATE_OPEN(r0, 0x0, 0x0) [ 2199.470099][T25660] jfs_mount: Mount Failure: superblock is corrupt! [ 2199.521940][T25660] Mount JFS Failure: -22 [ 2199.531130][T25660] jfs_mount failed w/return code = -22 08:11:22 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendmsg$inet(r0, 0x0, 0x0) [ 2199.601299][T25660] loop3: detected capacity change from 0 to 386 08:11:22 executing program 1: semctl$IPC_INFO(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000540)=""/4096) [ 2199.642980][T25660] jfs_mount: Mount Failure: superblock is corrupt! 08:11:23 executing program 5: r0 = memfd_create(&(0x7f00000004c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbbk\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f\xd95\x9d|?\xa5\xfa\xbc|\xce\xf6\x97\xecxrn\x89\xd9\x9a\xd4w\x80\xf0\"\xe2\x9b\x9d\xccM\xe8\xd8|\xb2/\xe9/\x10\xce\xeb\xf9\x92\x1b\xff\xe6\x99\xef\x04IG\x04\xfb\xb0[\xec:\xe2B\x82Z\xc0C\xed\x93\x8bu\xb9\x19\xa0\x96Ev\xb3v5g$\xcfOo\xff\xc8\xae\xf9J@\xda\x06)k,\xbb8=\x9bjS\xa1\xc3\x9b<\"K\x03\x13\xdcq\x80\x8b\x868s48\x9fK\x14\xdbmH\xe8$_J?[J\xe3\r\x80\xe8m!Zh\xa5\xc3A\xcc]L\xb1{q\xe4\xf6\b\xbe\xa23\x9c6\xba\xcb@\xef\xe7\x82\x934\x8b\xd1B\xb0\v\xd30R\v\xa6', 0x0) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000140), 0x21c) setxattr$system_posix_acl(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 08:11:23 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x1) [ 2199.712073][T25660] Mount JFS Failure: -22 [ 2199.730696][T25660] jfs_mount failed w/return code = -22 08:11:23 executing program 0: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x10160, 0x0) 08:11:23 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000005d", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:23 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) recvfrom(r0, 0x0, 0x0, 0x20, 0x0, 0x0) 08:11:23 executing program 4: openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.pending_reads\x00', 0x20040, 0x42) 08:11:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) 08:11:23 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendmsg$sock(r0, 0x0, 0x0) 08:11:23 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xa242, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x20a640, 0x109) 08:11:23 executing program 2: semctl$IPC_INFO(0x0, 0x4, 0x3, &(0x7f0000001000)=""/196) 08:11:23 executing program 0: shmget$private(0x0, 0x4000, 0x4, &(0x7f0000ffb000/0x4000)=nil) [ 2200.163950][T25699] loop3: detected capacity change from 0 to 386 [ 2200.184638][T25699] jfs_mount: Mount Failure: superblock is corrupt! [ 2200.206364][T25699] Mount JFS Failure: -22 08:11:23 executing program 1: syz_mount_image$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 08:11:23 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000008c0), 0x2c2200, 0x0) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(r0, 0x3312, 0x0) 08:11:23 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x4000, 0x0, &(0x7f0000000240)) 08:11:23 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) unlinkat(r0, &(0x7f00000003c0)='./file0\x00', 0x0) [ 2200.305990][T25699] jfs_mount failed w/return code = -22 [ 2200.471890][T25699] loop3: detected capacity change from 0 to 386 [ 2200.551726][T25699] jfs_mount: Mount Failure: superblock is corrupt! [ 2200.637080][T25699] Mount JFS Failure: -22 [ 2200.643491][T25699] jfs_mount failed w/return code = -22 08:11:24 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000063", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:24 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_STATFS(r0, 0x0, 0x0) 08:11:24 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockname(r0, 0x0, &(0x7f0000000400)) 08:11:24 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) recvmmsg(r0, &(0x7f0000000080)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2000, &(0x7f0000000280)) 08:11:24 executing program 0: syz_mount_image$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4000, 0x0) 08:11:24 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 08:11:24 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 08:11:24 executing program 2: semget$private(0x0, 0x3, 0x324) 08:11:24 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, 0x0) 08:11:24 executing program 4: mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x300000c, 0x8c2c20cab9bb96f2, 0xffffffffffffffff, 0x0) [ 2201.051785][T25738] loop3: detected capacity change from 0 to 386 [ 2201.114776][T25738] jfs_mount: Mount Failure: superblock is corrupt! 08:11:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) [ 2201.210569][T25738] Mount JFS Failure: -22 08:11:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000000)="ef", 0x1, 0x4004804, 0x0, 0x0) [ 2201.245425][T25738] jfs_mount failed w/return code = -22 [ 2201.392199][T25738] loop3: detected capacity change from 0 to 386 [ 2201.412441][T25738] jfs_mount: Mount Failure: superblock is corrupt! [ 2201.422419][T25738] Mount JFS Failure: -22 [ 2201.465427][T25738] jfs_mount failed w/return code = -22 08:11:24 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000006f", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:24 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmmsg(r0, 0x0, 0x0, 0x20, &(0x7f0000000540)) [ 2201.825862][T25765] loop3: detected capacity change from 0 to 386 08:11:25 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0) 08:11:25 executing program 1: pselect6(0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140), 0x0) 08:11:25 executing program 0: syz_mount_image$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x22d80, 0x8) 08:11:25 executing program 2: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f00000020c0), 0x0, 0x0) 08:11:25 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg(r0, &(0x7f0000000140), 0x0, 0x0) 08:11:25 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f00000000c0)=0x9) r1 = semget(0x2, 0x0, 0x0) semctl$IPC_RMID(r1, 0x0, 0x0) r2 = semget(0x1, 0x0, 0x430) semctl$SEM_STAT(r2, 0x0, 0x12, &(0x7f0000000000)=""/173) [ 2202.001813][T25765] jfs_mount: Mount Failure: superblock is corrupt! [ 2202.046916][T25765] Mount JFS Failure: -22 08:11:25 executing program 4: pselect6(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000140), 0x0) [ 2202.071443][T25765] jfs_mount failed w/return code = -22 08:11:25 executing program 2: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f00000003c0), 0x1291c0, 0x0) 08:11:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000002680)={&(0x7f0000000100)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "7d762a6f1a5f6f8f0b469e46a30f16f8fc3327ecd5c119fc7f092b15122b3897249a78ac0feedca6fae02e80d7c3ed5db7338443c3761b81f8d53d4a15c81d"}, 0x80, 0x0}, 0x0) [ 2202.151014][T25765] loop3: detected capacity change from 0 to 386 [ 2202.165770][T25765] jfs_mount: Mount Failure: superblock is corrupt! [ 2202.173203][T25765] Mount JFS Failure: -22 [ 2202.177642][T25765] jfs_mount failed w/return code = -22 08:11:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000000)="95a687cbda9c8f57971c89fe5ee897796bf69c0cbafa1c525fb51d25b22fa3cd0aeea1a39525182ea6ada6ffca73c71b6e33de7bac7ac4ae3d3200d89a2b3272dcdb8c", 0x1, 0x240088c0, 0x0, 0xfffffffffffffea2) 08:11:25 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000088", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:25 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x4e802, 0x0) write$char_usb(r0, 0x0, 0xfd02) [ 2202.590024][T25798] loop3: detected capacity change from 0 to 386 [ 2202.628348][T25798] jfs_mount: Mount Failure: superblock is corrupt! [ 2202.635096][T25798] Mount JFS Failure: -22 08:11:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockname(r0, 0x0, &(0x7f0000000180)) 08:11:25 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) 08:11:25 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$tcp_congestion(r0, 0x0, 0x0) 08:11:25 executing program 1: r0 = semget$private(0x0, 0x5, 0x0) semctl$GETPID(r0, 0x1, 0xb, 0x0) 08:11:25 executing program 0: openat$incfs(0xffffffffffffff9c, &(0x7f0000001440)='.pending_reads\x00', 0x101840, 0x0) [ 2202.640874][T25798] jfs_mount failed w/return code = -22 [ 2202.690265][T25798] loop3: detected capacity change from 0 to 386 [ 2202.701859][T25798] jfs_mount: Mount Failure: superblock is corrupt! [ 2202.739309][T25798] Mount JFS Failure: -22 [ 2202.744394][T25798] jfs_mount failed w/return code = -22 08:11:26 executing program 2: syz_mount_image$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mknodat$null(r0, &(0x7f0000000040)='./file0\x00', 0x1000, 0x103) 08:11:26 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x8, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:26 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$P9_RREADDIR(r0, 0x0, 0x0) 08:11:26 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) 08:11:26 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='comm\x00') ioctl$TIOCVHANGUP(r0, 0x5451, 0x0) 08:11:26 executing program 2: semget(0x0, 0x3, 0x64e6b1df09da4a8d) 08:11:26 executing program 4: semget$private(0x0, 0x5, 0x172) 08:11:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$inet(r0, &(0x7f0000006280)=[{{&(0x7f0000000180)={0x2, 0x0, @multicast1}, 0x10, 0x0}}], 0x1, 0x0) [ 2203.168088][T25826] loop3: detected capacity change from 0 to 386 08:11:26 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xa6540, 0x16) [ 2203.221589][T25826] Currently only 4K block size supported! [ 2203.229617][T25826] Mount JFS Failure: -22 [ 2203.234289][T25826] jfs_mount failed w/return code = -22 08:11:26 executing program 0: pipe2$9p(&(0x7f0000001f00)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERROR(r0, 0x0, 0x0) 08:11:26 executing program 5: semget(0x2, 0x1, 0x0) 08:11:26 executing program 2: syz_mount_image$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000700)='./file0/file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0/file0\x00', 0x12000, 0x0) [ 2203.330883][T25826] loop3: detected capacity change from 0 to 386 [ 2203.350070][T25826] Currently only 4K block size supported! [ 2203.356748][T25826] Mount JFS Failure: -22 [ 2203.361802][T25826] jfs_mount failed w/return code = -22 08:11:26 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x19, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:26 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x40040, 0x0) 08:11:27 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x0, 0x0}) 08:11:27 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x4e802, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) [ 2203.657617][ T37] audit: type=1800 audit(1620029486.969:144): pid=25845 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15920 res=0 errno=0 08:11:27 executing program 0: get_mempolicy(&(0x7f0000000080), &(0x7f00000000c0), 0x6, &(0x7f0000ff5000/0xb000)=nil, 0x3) 08:11:27 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) utimensat(r0, 0x0, &(0x7f00000000c0), 0x0) 08:11:27 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) sendto(r0, &(0x7f00000000c0), 0x0, 0x4044001, &(0x7f0000000180)=@rc, 0x80) [ 2203.845117][T25854] loop3: detected capacity change from 0 to 386 [ 2203.897510][T25854] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2203.897510][T25854] [ 2203.910446][T25854] ERROR: (device loop3): remounting filesystem as read-only [ 2203.917982][T25854] xtLookup: xtSearch returned -5 [ 2203.926235][T25854] read_mapping_page failed! [ 2203.932765][T25854] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2203.940189][T25854] Mount JFS Failure: -5 [ 2203.944586][T25854] jfs_mount failed w/return code = -5 [ 2203.997281][T25854] loop3: detected capacity change from 0 to 386 [ 2204.015675][T25854] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2204.015675][T25854] [ 2204.026366][T25854] ERROR: (device loop3): remounting filesystem as read-only [ 2204.035749][T25854] xtLookup: xtSearch returned -5 08:11:27 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x200, 0x0) 08:11:27 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xc28c0, 0xa) [ 2204.046838][T25854] read_mapping_page failed! [ 2204.053253][T25854] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2204.063237][T25854] Mount JFS Failure: -5 [ 2204.067612][T25854] jfs_mount failed w/return code = -5 08:11:27 executing program 1: mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f00000000c0)=""/85) 08:11:27 executing program 5: pipe2$9p(&(0x7f0000001f00)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$eventfd(r0, 0x0, 0x0) 08:11:27 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, 0x0, 0x0, 0x0) 08:11:27 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x28, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:27 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendmmsg$inet(r0, 0x0, 0x0, 0x0) 08:11:27 executing program 2: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002100), 0x200, 0x0) 08:11:27 executing program 1: syz_mount_image$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000180)='./file1\x00') 08:11:28 executing program 2: pipe2$9p(&(0x7f0000001f00)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RFSYNC(r0, 0x0, 0xffffffffffffffbd) 08:11:28 executing program 4: openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.pending_reads\x00', 0x0, 0x0) 08:11:28 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$char_usb(r0, 0x0, 0xffffffffffffffa6) [ 2204.719758][T25888] loop3: detected capacity change from 0 to 386 08:11:28 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001080), 0x20081, 0x0) write$FUSE_BMAP(r0, 0x0, 0x0) 08:11:28 executing program 2: semget$private(0x0, 0x4, 0x406) [ 2204.874016][T25888] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2204.874016][T25888] [ 2204.936896][T25888] ERROR: (device loop3): remounting filesystem as read-only [ 2204.993065][T25888] xtLookup: xtSearch returned -5 08:11:28 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002580)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$sock(r0, 0x0, 0xffffffc9, 0x0) [ 2205.015268][T25888] read_mapping_page failed! [ 2205.049318][T25888] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2205.095206][T25888] Mount JFS Failure: -5 [ 2205.118304][T25888] jfs_mount failed w/return code = -5 [ 2205.190179][T25888] loop3: detected capacity change from 0 to 386 [ 2205.212824][T25888] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2205.212824][T25888] 08:11:28 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) 08:11:28 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x0) [ 2205.272415][T25888] ERROR: (device loop3): remounting filesystem as read-only [ 2205.298732][T25888] xtLookup: xtSearch returned -5 [ 2205.304995][T25888] read_mapping_page failed! [ 2205.311378][T25888] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2205.318343][T25888] Mount JFS Failure: -5 08:11:28 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x31, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000009d00)) 08:11:28 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) linkat(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) 08:11:28 executing program 2: syz_mount_image$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200000, 0x19e) [ 2205.326515][T25888] jfs_mount failed w/return code = -5 08:11:28 executing program 4: r0 = eventfd2(0x3, 0x0) read$eventfd(r0, &(0x7f0000000000), 0x8) 08:11:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, &(0x7f00000018c0), 0x0, 0x4000000, 0x0, 0x0) 08:11:28 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x8000) 08:11:28 executing program 2: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x234080, 0x0) 08:11:29 executing program 1: syz_mount_image$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', 0x4180, 0xd4) [ 2205.716411][T25927] loop3: detected capacity change from 0 to 386 08:11:29 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$P9_RFSYNC(r0, 0x0, 0x21) [ 2205.843677][T25927] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2205.843677][T25927] [ 2205.940275][T25927] ERROR: (device loop3): remounting filesystem as read-only [ 2205.948138][T25927] xtLookup: xtSearch returned -5 [ 2205.955471][T25927] read_mapping_page failed! [ 2205.961891][T25927] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2205.971988][T25927] Mount JFS Failure: -5 [ 2205.976565][T25927] jfs_mount failed w/return code = -5 [ 2206.099257][T25927] loop3: detected capacity change from 0 to 386 [ 2206.117352][T25927] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2206.117352][T25927] [ 2206.262060][T25927] ERROR: (device loop3): remounting filesystem as read-only [ 2206.287554][T25927] xtLookup: xtSearch returned -5 [ 2206.316434][T25927] read_mapping_page failed! [ 2206.339496][T25927] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2206.381655][T25927] Mount JFS Failure: -5 [ 2206.411027][T25927] jfs_mount failed w/return code = -5 08:11:29 executing program 5: openat$random(0xffffffffffffff9c, &(0x7f0000000180), 0x140, 0x0) 08:11:29 executing program 1: unlink(&(0x7f0000000100)='./file0\x00') 08:11:29 executing program 2: syz_mount_image$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000300)='./file0/file0\x00', 0x0, 0x1) unlink(&(0x7f00000000c0)='./file0/file0\x00') 08:11:29 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x36, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:29 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, 0x0) 08:11:29 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4c0, 0x1ae) 08:11:30 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getdents64(r0, 0x0, 0x0) [ 2206.748926][T25955] loop3: detected capacity change from 0 to 386 08:11:30 executing program 4: munlock(&(0x7f0000ffb000/0x1000)=nil, 0x1000) 08:11:30 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) sendto(r0, 0x0, 0x0, 0x4004081, 0x0, 0x3d) 08:11:30 executing program 4: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xa242, 0x184) [ 2206.895028][T25955] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2206.895028][T25955] [ 2206.933446][T25955] ERROR: (device loop3): remounting filesystem as read-only 08:11:30 executing program 0: set_robust_list(&(0x7f00000000c0), 0x18) 08:11:30 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x4e802, 0x0) write$FUSE_DIRENT(r0, 0x0, 0x0) [ 2206.961991][T25955] xtLookup: xtSearch returned -5 [ 2206.974501][T25955] read_mapping_page failed! [ 2207.014221][T25955] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2207.047180][T25955] Mount JFS Failure: -5 [ 2207.067352][T25955] jfs_mount failed w/return code = -5 [ 2207.154863][T25955] loop3: detected capacity change from 0 to 386 08:11:30 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getsockname(r0, 0x0, 0x0) 08:11:30 executing program 4: openat$incfs(0xffffffffffffff9c, &(0x7f0000001440)='.pending_reads\x00', 0x101840, 0x80) 08:11:30 executing program 1: pipe2$9p(&(0x7f0000001f00)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) io_submit(0x0, 0x1, &(0x7f0000002580)=[&(0x7f0000002140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 08:11:30 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='.\x00', 0x0, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='.\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) dup2(r3, r0) openat$incfs(r0, &(0x7f0000001180)='.pending_reads\x00', 0x8c40, 0x0) 08:11:30 executing program 0: r0 = semget$private(0x0, 0x2, 0x0) semctl$SEM_STAT(r0, 0x0, 0x12, 0x0) 08:11:30 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x3c, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:31 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) 08:11:31 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) recvmmsg(r0, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)=""/112, 0x70}], 0x1}}], 0x1, 0x0, 0x0) 08:11:31 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) 08:11:31 executing program 4: get_mempolicy(0x0, &(0x7f00000000c0), 0x6, &(0x7f0000ff5000/0xb000)=nil, 0x3) [ 2207.735218][T25993] loop3: detected capacity change from 0 to 386 [ 2207.753121][T25993] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2207.753121][T25993] [ 2207.766368][T25993] ERROR: (device loop3): remounting filesystem as read-only [ 2207.777365][T25993] xtLookup: xtSearch returned -5 [ 2207.784351][T25993] read_mapping_page failed! [ 2207.791329][T25993] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2207.802812][T25993] Mount JFS Failure: -5 [ 2207.814697][T25993] jfs_mount failed w/return code = -5 08:11:31 executing program 1: get_mempolicy(&(0x7f0000000000), &(0x7f0000000040), 0x62a, &(0x7f0000fff000/0x1000)=nil, 0x4) 08:11:31 executing program 0: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmat(r0, &(0x7f0000ffc000/0x3000)=nil, 0x4000) [ 2207.886192][T25993] loop3: detected capacity change from 0 to 386 [ 2207.905315][T25993] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2207.905315][T25993] 08:11:31 executing program 5: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) 08:11:31 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) recvmmsg(r0, 0x0, 0x0, 0x40000000, 0x0) [ 2207.959660][T25993] ERROR: (device loop3): remounting filesystem as read-only [ 2207.967192][T25993] xtLookup: xtSearch returned -5 [ 2207.974352][T25993] read_mapping_page failed! [ 2207.984925][T25993] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2207.993225][T25993] Mount JFS Failure: -5 [ 2207.997424][T25993] jfs_mount failed w/return code = -5 08:11:31 executing program 2: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x823c2, 0x3fc8f01cc45e59c9) 08:11:31 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getdents(r0, 0x0, 0x0) 08:11:31 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, 0x0) 08:11:31 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x44, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:31 executing program 1: semget(0x0, 0x0, 0x5) 08:11:31 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000004240), 0xb0080, 0x0) 08:11:31 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f000000ab40)) 08:11:31 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) 08:11:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, 0x0) 08:11:31 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xa242, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x100, 0x0, &(0x7f0000000140)) [ 2208.573889][T26037] loop3: detected capacity change from 0 to 386 [ 2208.612629][T26037] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2208.612629][T26037] [ 2208.623696][T26037] ERROR: (device loop3): remounting filesystem as read-only [ 2208.632131][T26037] xtLookup: xtSearch returned -5 [ 2208.637112][T26037] read_mapping_page failed! [ 2208.642946][T26037] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2208.649421][T26037] Mount JFS Failure: -5 [ 2208.653864][T26037] jfs_mount failed w/return code = -5 [ 2208.738942][T26037] loop3: detected capacity change from 0 to 386 [ 2208.747735][T26037] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2208.747735][T26037] [ 2208.770385][T26037] ERROR: (device loop3): remounting filesystem as read-only [ 2208.777796][T26037] xtLookup: xtSearch returned -5 [ 2208.796336][T26037] read_mapping_page failed! [ 2208.827438][T26037] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2208.856733][T26037] Mount JFS Failure: -5 [ 2208.880005][T26037] jfs_mount failed w/return code = -5 08:11:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, 0x0, 0x0) 08:11:32 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$P9_RREADLINK(r0, 0x0, 0x10) 08:11:32 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) fchownat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0xee00, 0x0) 08:11:32 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, 0x0) 08:11:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$inet(r0, 0x0, 0x811) 08:11:32 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x51, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:32 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) 08:11:32 executing program 0: r0 = semget(0x2, 0x0, 0x0) semctl$SEM_STAT(r0, 0x3, 0x12, &(0x7f0000000140)=""/164) 08:11:32 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) read$char_usb(r0, &(0x7f0000000000), 0x0) 08:11:32 executing program 2: semctl$IPC_INFO(0xffffffffffffffff, 0x3, 0x3, &(0x7f0000000080)=""/173) [ 2209.233062][T26058] loop3: detected capacity change from 0 to 386 [ 2209.253787][T26058] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2209.253787][T26058] [ 2209.335072][T26058] ERROR: (device loop3): remounting filesystem as read-only 08:11:32 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000240)) [ 2209.392594][T26058] xtLookup: xtSearch returned -5 08:11:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40, 0x0) [ 2209.439264][T26058] read_mapping_page failed! [ 2209.479006][T26058] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2209.513134][T26058] Mount JFS Failure: -5 [ 2209.545118][T26058] jfs_mount failed w/return code = -5 [ 2209.636453][T26058] loop3: detected capacity change from 0 to 386 [ 2209.655057][T26058] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2209.655057][T26058] [ 2209.676781][T26058] ERROR: (device loop3): remounting filesystem as read-only [ 2209.714137][T26058] xtLookup: xtSearch returned -5 [ 2209.752436][T26058] read_mapping_page failed! [ 2209.757022][T26058] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2209.802422][T26058] Mount JFS Failure: -5 [ 2209.806647][T26058] jfs_mount failed w/return code = -5 08:11:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) 08:11:33 executing program 2: syz_mount_image$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000300)='./file0/file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x40) 08:11:33 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 08:11:33 executing program 1: openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) 08:11:33 executing program 4: mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x300000f) 08:11:33 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x5d, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:33 executing program 1: semctl$SEM_INFO(0xffffffffffffffff, 0x3, 0x13, &(0x7f0000000140)=""/215) 08:11:33 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000008a40), 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0x0) 08:11:33 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 08:11:33 executing program 2: openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002840)='pids.max\x00', 0x2, 0x0) [ 2210.310904][T26097] loop3: detected capacity change from 0 to 386 [ 2210.357918][T26097] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2210.357918][T26097] [ 2210.427799][T26097] ERROR: (device loop3): remounting filesystem as read-only [ 2210.528801][T26097] xtLookup: xtSearch returned -5 08:11:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @bridge_slave={{0x11}, {0x14, 0x5, 0x0, 0x1, [@IFLA_BRPORT_UNICAST_FLOOD={0x5, 0x9, 0x1}, @IFLA_BRPORT_FAST_LEAVE={0x5, 0x7, 0x1}]}}}, @IFLA_PORT_SELF={0x4}]}, 0x50}}, 0x0) [ 2210.574931][T26097] read_mapping_page failed! 08:11:33 executing program 1: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x0, 0x6, &(0x7f0000000580)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @map={0x18, 0x5}, @alu={0x4, 0x0, 0x0, 0x8, 0xa, 0x0, 0xfffffffffffffff0}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}], &(0x7f0000000800)='GPL\x00', 0x1, 0xdf, &(0x7f0000000600)=""/223, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000740)={0x5, 0x6, 0xf3a, 0xffff}, 0x10}, 0x78) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000140)=""/93) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000100)={0x2, 0x0, 0x3}) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000003b00)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000003ac0)={&(0x7f0000000400)=ANY=[@ANYBLOB="f4000000eb359595fba7f73cd7bf40cee0fd5aa42ad9f3112aaea80c71127c1ab9f173ebf919c96ff93464fe23302842984690ce927cc28a9e5b05688c62d6d79fa99a925a7d279073374b749feb9aa45edcfc209a0000bb4590236c94561aa826eb23f57ed3d11505000000cad8fb1bb5caf1", @ANYRES16=0x0, @ANYBLOB="020025bd7000fddbdf2503000000050005007f000000540001800800", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="600194cfd1493808000000", @ANYRES32=0x0, @ANYBLOB="0800030003000000140002007866726d3000", @ANYRES32=0x0, @ANYBLOB="14000200776c616e30000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="140002006772657461703000000000000000000048000180140002006272696467655f736c6176655f31000008000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f3100001400020074756e6c3000"/40], 0xf4}, 0x1, 0x0, 0x0, 0x40043}, 0x4000840) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f00000003c0)=ANY=[], 0x9) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 2210.628132][T26097] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2210.711022][T26097] Mount JFS Failure: -5 [ 2210.727020][T26097] jfs_mount failed w/return code = -5 [ 2210.794695][T26097] loop3: detected capacity change from 0 to 386 [ 2210.872013][T26097] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2210.872013][T26097] 08:11:34 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xa6540, 0xd6) 08:11:34 executing program 0: r0 = socket$inet(0x2, 0x2000080001, 0x84) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000040), 0x8) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a00f}], 0x1}, 0x0) 08:11:34 executing program 4: semctl$IPC_INFO(0xffffffffffffffff, 0x2, 0x3, &(0x7f0000000080)=""/173) 08:11:34 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x20000, 0x8) [ 2210.912528][T26097] ERROR: (device loop3): remounting filesystem as read-only [ 2210.923760][T26097] xtLookup: xtSearch returned -5 [ 2210.929192][T26097] read_mapping_page failed! [ 2210.933901][T26097] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2210.940879][T26097] Mount JFS Failure: -5 [ 2210.945098][T26097] jfs_mount failed w/return code = -5 08:11:34 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x6f, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:34 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname(r0, 0x0, &(0x7f0000007200)) 08:11:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)={0x7c, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_FRAME={0x60, 0x33, @beacon={@with_ht={{{}, {}, @broadcast, @device_b}}, 0x0, @random, 0x0, @val={0x0, 0x6, @default_ap_ssid}, @val, @val={0x3, 0x1}, @val={0x4, 0x6}, @val={0x6, 0x2}, @val={0x5, 0x3}, @val={0x25, 0x3}, @val={0x2a, 0x1}, @val={0x3c, 0x4}, @void, @void, @void, @void, [{0xdd, 0x6, "7fbc64c1401c"}]}}]}, 0x7c}}, 0x0) 08:11:34 executing program 2: request_key(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)='keyring\x00', 0x0) 08:11:34 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETGAMMA(r0, 0xc020660b, 0x0) 08:11:34 executing program 4: socketpair(0x1d, 0x0, 0x2, &(0x7f0000000380)) 08:11:34 executing program 0: syz_mount_image$pvfs2(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000100)=@nullb, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ocfs2\x00', 0x0, 0x0) 08:11:34 executing program 1: socket(0x18, 0x0, 0x1ff) [ 2211.446681][T26139] loop3: detected capacity change from 0 to 386 [ 2211.516090][T26139] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2211.516090][T26139] [ 2211.533510][T26139] ERROR: (device loop3): remounting filesystem as read-only 08:11:34 executing program 5: syz_mount_image$pvfs2(0x0, 0x0, 0x0, 0x0, &(0x7f0000004c80), 0x0, 0x0) 08:11:34 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x35, 0x35, 0x2, [@array, @var, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], 'd'}]}}, 0x0, 0x52}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:11:34 executing program 0: recvmsg$qrtr(0xffffffffffffffff, 0x0, 0x0, 0x0) 08:11:34 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) [ 2211.570960][ T37] audit: type=1800 audit(1620029494.888:145): pid=26147 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=15713 res=0 errno=0 [ 2211.599549][T26139] xtLookup: xtSearch returned -5 [ 2211.615963][T26139] read_mapping_page failed! [ 2211.628360][T26139] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2211.651218][T26139] Mount JFS Failure: -5 [ 2211.673864][T26139] jfs_mount failed w/return code = -5 [ 2211.757556][T26139] loop3: detected capacity change from 0 to 386 [ 2211.802984][T26139] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2211.802984][T26139] [ 2211.881192][T26139] ERROR: (device loop3): remounting filesystem as read-only [ 2211.911435][T26139] xtLookup: xtSearch returned -5 [ 2211.931372][T26139] read_mapping_page failed! [ 2211.947979][T26139] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2211.976740][T26139] Mount JFS Failure: -5 [ 2211.992767][T26139] jfs_mount failed w/return code = -5 08:11:35 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x88, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:35 executing program 4: syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) sysinfo(&(0x7f0000000340)=""/135) 08:11:35 executing program 2: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000b00)=[{&(0x7f0000000940)=""/250, 0xfa}, {&(0x7f0000000a40)=""/74, 0x4a}, {&(0x7f0000000140)=""/24, 0x18}], 0x3, 0x40, 0x6) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) lstat(&(0x7f0000000740)='./file2\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) mount(&(0x7f0000000480)=ANY=[@ANYBLOB="675e508392b6fdffb8e601000000000000002668d9342e0ff448bfacffa5bc852432b84a8c"], 0x0, &(0x7f0000000180)='fuseblk\x00', 0x201000, &(0x7f00000002c0)='size') mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, 0x0) creat(&(0x7f00000003c0)='./bus/file0\x00', 0x8f) syz_mount_image$tmpfs(&(0x7f0000000040), 0x0, 0x2, 0x0, 0x0, 0x0, &(0x7f0000000e00)=ANY=[@ANYBLOB='huge=advise,mpol=prefer=relative,gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d002c666f776e65723cbdaeb62a43ef246b8116fb9e788e35447951a06026dcca48f31c5d360cf0b0c3828525f9d192def61c6c5f9c811eb7d4cb562b7aedf4ecc60e1f078e0e695ae8a416c6d8a738c9acb370995fd62b00fb5a907099a75b00d63e9eddb341b58c36e84ee6c3a7b930eb3e660f1200c24ed3", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000800)={&(0x7f0000000f00)=ANY=[@ANYBLOB="ffffffed000000000000000000", @ANYRES16=r2, @ANYBLOB="000229bd7000fcdbdf25020000000c000400fdffffffffffffff0c00060003000000000000000c00080002000000000000000c00060003000000000000000c0008001574000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x48010}, 0x41) perf_event_open(&(0x7f00000008c0)={0x0, 0x80, 0x4, 0x6, 0x84, 0x20, 0x0, 0x0, 0x8210, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x0, @perf_bp={&(0x7f0000000880), 0x2}, 0x40000, 0x5, 0x2, 0x1, 0x10000, 0x9, 0x1ff, 0x0, 0xa0b, 0x0, 0x38}, 0x0, 0x7, 0xffffffffffffffff, 0x9) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$squashfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x8, 0x0, &(0x7f00000007c0), 0x8000, &(0x7f0000000c80)={[{'\n{\\!.{'}, {'+*'}, {'\x84\x0eT\xd8\x00\x00Gi\xecx\xa3\xef\xd8&)$'}, {'hu\x7f\x8ci\x06\x00[o\x8a\xf6\xb2)=\x12\x92\xb5d\x0e\xfe\x14\xa4sV\xfb\xfb\xb6\xa98\x10\xd9az\x06V|\xa3D\xf9\xc5\xd7\xf9\xd8h\x0e\xc5\x11>]\xd3w\xe9#\xe7\xf9^K\xb7S\xe5\xecM:D9\x9b\xbf\xc4\"\n\xf8\x8d\xe3\xe3~\x0e>2\x8b\xce\xc5?\x04\x96.\xa7\x01\"\x03\xaa\x8fo\xda\x9ej\xcc\x8e8\x01\x7f\xb4\xdd\xa3\xfbr\x97\xe7;Z\x1a\x9e\x17\x15\f\xab\xcd?q\xbd\xa7\x92je\x9dm\x00\xd2\xd5r[\xc8\x8f1\xe5\xaa\x87\xe8\xf0\xb58\x85\x1c\x826\x14\x01H\x03\xd6\xd8k\x17p\xef\x11\x1f\x1e\x17\xf5\xbb\xe2 \xbb]^\xf6\xe1^\x8b\xa1\x1bE\'\xe4h1\xe6L\xbc\x1b[\xe1q#.,\xfa\xd1\xd6\xc6 \x83\x97{\xd5M\x97\x9e\xd6Y\x7f\x17f\x9eq?\xcf\xae|\xb6(\xd0o\xc2\xe0\x93x}\x17\x1b\x1c\xcd\x8bqFyl\a\xcf\xbbgg\xb7\x046Rk\xffp\xa5i\x7f3^\x03f\xab\"n\x8f*\xbd:\xf1E\xb9\x85<'}, {'work\x9f(E\xf4Kdyr'}], [{@euid_lt={'euid<', r1}}]}) 08:11:35 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0, 0xb8}}, 0x0) 08:11:35 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r0, 0x104, 0x2, &(0x7f0000000080)=0x400, 0x4) 08:11:35 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$afs(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{}, {@source={'source', 0x3d, '/dev/null\x00'}}], [{@appraise}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) 08:11:35 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) io_setup(0x3, &(0x7f0000000140)=0x0) io_pgetevents(r0, 0x5, 0x5, &(0x7f00000001c0)=[{}, {}, {}, {}, {}], &(0x7f0000000040)={0x0, 0x3938700}, &(0x7f0000000380)={0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) 08:11:35 executing program 4: ioprio_set$pid(0x0, 0x0, 0x0) 08:11:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000010c0)=@nat={'nat\x00', 0x1b, 0x5, 0x3e0, 0x2a0, 0x0, 0xffffffff, 0x0, 0x0, 0x348, 0x348, 0xffffffff, 0x348, 0x348, 0x5, 0x0, {[{{@uncond, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={{0x30}}, @common=@icmp={{0x28}, {0x0, "5de8"}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local, @gre_key}}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @dev, 0x0, 0x0, 'veth0_to_team\x00', 'vlan0\x00'}, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @loopback, @rand_addr, @icmp_id, @icmp_id}}}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'geneve1\x00', 'bridge0\x00'}, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "94ca"}}, @common=@inet=@socket2={{0x28}}]}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x0, @loopback, @loopback, @icmp_id, @gre_key}}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, 0x0, 0x0, 'syzkaller0\x00', 'macsec0\x00'}, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @multicast2, @multicast1, @port, @icmp_id}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) 08:11:35 executing program 1: syz_mount_image$efs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$pvfs2(&(0x7f0000001800), 0x0, 0xf881, 0x0, 0x0, 0x0, 0x0) [ 2212.316158][T26176] loop3: detected capacity change from 0 to 386 [ 2212.373903][T26176] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2212.373903][T26176] [ 2212.390436][T26176] ERROR: (device loop3): remounting filesystem as read-only [ 2212.399395][T26176] xtLookup: xtSearch returned -5 [ 2212.405222][T26176] read_mapping_page failed! [ 2212.411657][T26176] jfs_mount: diMount(ipaimap) failed w/rc = -5 08:11:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x6, 0x1}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 08:11:35 executing program 4: openat$nvram(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) [ 2212.433355][T26176] Mount JFS Failure: -5 [ 2212.437636][T26176] jfs_mount failed w/return code = -5 [ 2212.532932][T26176] loop3: detected capacity change from 0 to 386 [ 2212.545251][T26176] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2212.545251][T26176] [ 2212.656124][T26176] ERROR: (device loop3): remounting filesystem as read-only [ 2212.723894][T26176] xtLookup: xtSearch returned -5 [ 2212.738919][T26176] read_mapping_page failed! [ 2212.757524][T26176] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2212.782092][T26176] Mount JFS Failure: -5 [ 2212.813004][T26176] jfs_mount failed w/return code = -5 08:11:36 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x7f00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:36 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000005140), 0x0, 0x0) read$FUSE(r0, &(0x7f0000005340)={0x2020}, 0x2020) 08:11:36 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000500)={0x0}}, 0x0) 08:11:36 executing program 0: syz_open_dev$cec(&(0x7f0000000780), 0x2, 0x2) 08:11:36 executing program 4: getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$HIDIOCGREPORT(0xffffffffffffffff, 0x400c4807, &(0x7f0000000100)) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0xcb7}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 08:11:36 executing program 5: recvfrom$phonet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 08:11:36 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:11:36 executing program 1: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000240)={0x0, 0x9, 0x4, 0x0, 0x0, {0x0, 0xea60}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "ed92851c"}, 0x0, 0x0, @fd, 0x9f}) 08:11:36 executing program 0: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_disconnect(r0) r1 = syz_usb_connect(0x0, 0x24, &(0x7f00000000c0)=ANY=[], 0x0) syz_usb_control_io$hid(r1, 0x0, 0x0) syz_usb_control_io(r1, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r1, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r1, 0x0, 0x0) 08:11:36 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'nr0\x00'}, 0x18) [ 2213.209022][T26209] loop3: detected capacity change from 0 to 386 08:11:36 executing program 5: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0200000000003434180100007a4a7934d9d44b9a000000003f00000000000000000010000000000004000000000000001000000005000000010000000000000004000000000000000000000000000000e003000000000000561b675f00000000571b675f00000000571b675f000000000100320000000100561b675f00000000004eed0000000000000000000b00000080002000c0001000dadd32bf8764466dbb0c25de8a84ef61", 0xa8, 0x400}, {&(0x7f0000010100)="dd6bcb1c8fa443cb11faaf1e", 0xc, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 08:11:36 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x0) [ 2213.384429][T26209] Mount JFS Failure: -22 [ 2213.448858][T26209] jfs_mount failed w/return code = -22 [ 2213.512891][T26209] loop3: detected capacity change from 0 to 386 [ 2213.534773][T26209] Mount JFS Failure: -22 [ 2213.548732][T26209] jfs_mount failed w/return code = -22 08:11:36 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000180), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000000)={0x5, 0xc, 0x40081, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0xc00c642d, &(0x7f0000000100)={r1}) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') syz_open_dev$swradio(&(0x7f0000000100), 0x0, 0x2) fanotify_init(0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 08:11:36 executing program 1: r0 = syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200020000100010005000000001c08107f13", 0x12, 0x400}, {&(0x7f0000010100)="ff000000feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff03f0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed415cf970000000e7c2645f5303", 0x80e, 0x800}, {0x0, 0x0, 0x1400}], 0x0, &(0x7f0000000300)=ANY=[]) r1 = dup2(r0, r0) utimensat(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 08:11:36 executing program 2: sendmsg$RDMA_NLDEV_CMD_RES_GET(0xffffffffffffffff, 0x0, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000780)='./file0\x00', 0x0) openat$incfs(0xffffffffffffff9c, &(0x7f0000000980)='.pending_reads\x00', 0x101000, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(0xffffffffffffffff, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={&(0x7f0000000f40)={0x20, 0x140a, 0x8, 0x0, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x1}]}, 0x20}}, 0x0) recvmsg$can_bcm(0xffffffffffffffff, 0x0, 0x20) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001780), &(0x7f00000017c0)='./file0\x00', 0x4, 0x3, &(0x7f0000001cc0)=[{&(0x7f0000001800)="3bfb92570045abf05456d9c0b2bfda38d24a2c759fcb2738e660b6acab07805c33721a528e5f40de21e59b37e6b8679e8c93d036798f5a161cba9b9b1c80c4292eb18a6f713966725b062957cbdf8e5a94c202a10441fc0c20c3cbf0362c8341c661a0b6e15a4eda8631bb973c35734cc85f993a6c66d9eb8320e213fdc150ea94234f1935d3", 0x86}, {&(0x7f0000001900)="d325030658dcd4a24eb3ec7ec977c8f4fbb43d440d045c4e0e03fe75c41afae7508c28ffca58f6c1829a1fd86f299649159934be5c4f8c7564b44f90547eebcde1a7da9b1d99f1647b098c3ba6dacb13e662cd2bd6858ffd3efd1aa3966d33a30dcd96054663d93998f363c53763bffef81daf7291783277cb2ce842118dd24fa37b601e2006301a020fe18cdb5d6d739970e0c82f737bf277bb4151e8592c90dbf6cebcdada5b9794c4", 0xaa, 0x7fffffff}, {&(0x7f00000019c0)='=', 0x1}], 0x810, &(0x7f0000001d40)={[{@mft_zone_multiplier}, {@utf8}, {@utf8}, {@gid={'gid', 0x3d, 0xffffffffffffffff}}, {@gid={'gid', 0x3d, 0xffffffffffffffff}}, {@dmask}], [{@seclabel}]}) 08:11:36 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8002}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:36 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4048aecb, &(0x7f0000001a40)={"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"}) [ 2213.678927][T17416] usb 1-1: new high-speed USB device number 106 using dummy_hcd 08:11:37 executing program 4: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000002280), 0x0, 0x0) write$FUSE_INIT(r0, 0x0, 0x0) 08:11:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x84, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_FRAME={0x60, 0x33, @beacon={@with_ht={{{}, {}, @device_b, @device_b}}, 0x0, @random, 0x0, @val={0x0, 0x6, @default_ap_ssid}, @val, @val={0x3, 0x1}, @val={0x4, 0x6}, @val={0x6, 0x2}, @val={0x5, 0x3}, @val={0x25, 0x3}, @val={0x2a, 0x1}, @val={0x3c, 0x4}, @void, @void, @void, @val={0x76, 0x6}}}, @NL80211_ATTR_CSA_C_OFFSETS_TX={0x6, 0xcd, [0x0]}]}, 0x84}}, 0x0) [ 2213.844254][T26236] loop1: detected capacity change from 0 to 20 [ 2213.893720][T26241] loop3: detected capacity change from 0 to 386 [ 2213.964024][T26236] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 2213.973023][T17416] usb 1-1: Using ep0 maxpacket: 8 08:11:37 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000140)={0x190, 0x48}) ioctl$FBIOGETCMAP(r0, 0x4600, &(0x7f0000000340)={0x0, 0x1, &(0x7f00000000c0)=[0x0], &(0x7f0000000100), &(0x7f00000002c0), 0x0}) [ 2214.083681][T26241] Mount JFS Failure: -22 [ 2214.096124][T26241] jfs_mount failed w/return code = -22 [ 2214.119060][T17416] usb 1-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 2214.134954][T17416] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2214.203821][T17416] usb 1-1: config 0 descriptor?? [ 2214.291625][T17416] gspca_main: stk1135-2.14.0 probing 174f:6a31 08:11:37 executing program 0: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, 0x0) 08:11:37 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000500)) 08:11:37 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000003b00)={0x0, 0x0, &(0x7f0000003ac0)={&(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="020025bd7000fddbdf2503000000050005007f000000540001800800", @ANYBLOB="080001", @ANYRES32=0x0, @ANYBLOB="600194cfd14938", @ANYRES32=0x0, @ANYBLOB, @ANYBLOB="1400", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB], 0xf4}, 0x1, 0x0, 0x0, 0x40043}, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f00000003c0)=ANY=[], 0x9) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 08:11:37 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8003}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:37 executing program 1: mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) [ 2214.519089][T17416] gspca_stk1135: reg_w 0x2 err -71 [ 2214.526871][T17416] gspca_stk1135: serial bus timeout: status=0x00 [ 2214.556397][T17416] gspca_stk1135: Sensor write failed [ 2214.600301][T17416] gspca_stk1135: serial bus timeout: status=0x00 [ 2214.629850][T17416] gspca_stk1135: Sensor write failed 08:11:38 executing program 2: syz_open_dev$dri(&(0x7f0000000780), 0x1, 0x0) [ 2214.659313][T17416] gspca_stk1135: serial bus timeout: status=0x00 08:11:38 executing program 4: syz_mount_image$qnx6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000032c0), 0x200002, 0x0) [ 2214.706491][T17416] gspca_stk1135: Sensor read failed [ 2214.718966][T26263] loop3: detected capacity change from 0 to 386 [ 2214.746124][T17416] gspca_stk1135: serial bus timeout: status=0x00 [ 2214.792758][T17416] gspca_stk1135: Sensor read failed 08:11:38 executing program 0: r0 = socket$inet(0x2, 0x2000080001, 0x84) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000040), 0x8) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) 08:11:38 executing program 5: openat$nvram(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) 08:11:38 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, &(0x7f0000000480)) [ 2214.847343][T26263] Mount JFS Failure: -22 [ 2214.852517][T26263] jfs_mount failed w/return code = -22 [ 2214.878212][T17416] gspca_stk1135: Detected sensor type unknown (0x0) [ 2214.928354][T17416] gspca_stk1135: serial bus timeout: status=0x00 [ 2214.966155][T26263] loop3: detected capacity change from 0 to 386 [ 2214.969235][T17416] gspca_stk1135: Sensor read failed [ 2214.994936][T17416] gspca_stk1135: serial bus timeout: status=0x00 [ 2215.001891][T26263] Mount JFS Failure: -22 [ 2215.008850][T17416] gspca_stk1135: Sensor read failed [ 2215.014735][T17416] gspca_stk1135: serial bus timeout: status=0x00 [ 2215.024989][T17416] gspca_stk1135: Sensor write failed [ 2215.035092][T17416] gspca_stk1135: serial bus timeout: status=0x00 08:11:38 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001d40)) 08:11:38 executing program 2: sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, 0x0, 0xd7af3f5844784ed) [ 2215.043505][T17416] gspca_stk1135: Sensor write failed [ 2215.051714][T17416] stk1135: probe of 1-1:0.0 failed with error -71 [ 2215.053524][T26263] jfs_mount failed w/return code = -22 [ 2215.063822][T17416] usb 1-1: USB disconnect, device number 106 08:11:38 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10001}, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x40) lseek(r2, 0x4200, 0x0) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r5, 0x0, 0x8400fffffffb) sendfile(r1, r1, 0x0, 0x8080ffffff7e) 08:11:38 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001040), 0x0, 0x0) ioctl$SIOCRSACCEPT(r0, 0x89e3) 08:11:38 executing program 1: r0 = syz_io_uring_setup(0x2acc, &(0x7f0000000400), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) r3 = socket$can_raw(0x1d, 0x3, 0x1) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) 08:11:38 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8004}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:38 executing program 4: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$qrtr(r0, &(0x7f0000000080), 0xc) 08:11:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) recvfrom(r1, &(0x7f0000000040)=""/168, 0xa8, 0x0, 0x0, 0x0) 08:11:38 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001040), 0x0, 0x0) connect$rose(r0, &(0x7f0000001080)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @bcast, @null, @bcast]}, 0x200010c0) 08:11:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x24, r3, 0xf, 0x0, 0x0, {0xf}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_HOP_PENALTY={0x5}]}, 0x24}}, 0x0) [ 2215.601233][T26305] loop3: detected capacity change from 0 to 386 [ 2215.632427][T26305] Mount JFS Failure: -22 [ 2215.637234][T26305] jfs_mount failed w/return code = -22 [ 2215.695993][T26305] loop3: detected capacity change from 0 to 386 [ 2215.705347][T26305] Mount JFS Failure: -22 [ 2215.712561][T26305] jfs_mount failed w/return code = -22 08:11:39 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @any, 0xffff}, 0xe) connect$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x0, @none, 0x98}, 0xe) shutdown(r0, 0x1) 08:11:39 executing program 4: keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000000)=""/36, 0x24) 08:11:39 executing program 1: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000400), 0x42880, 0x0) 08:11:39 executing program 2: r0 = semget$private(0x0, 0x4, 0x0) semctl$GETNCNT(r0, 0x2, 0xe, &(0x7f0000000140)=""/40) 08:11:39 executing program 0: mlockall(0x1) ioctl$SIOCRSSL2CALL(0xffffffffffffffff, 0x89e2, 0x0) syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_STATION(0xffffffffffffffff, 0x0, 0x0) 08:11:39 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8005}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:39 executing program 2: syz_mount_image$efs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f00000015c0), 0x0, &(0x7f0000001680)={[{'P$&$*'}, {}], [{@smackfsfloor={'smackfsfloor', 0x3d, '&.'}}, {@fsname={'fsname', 0x3d, '\'&'}}]}) 08:11:39 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x1, 0x0) 08:11:39 executing program 1: syz_open_dev$vcsu(0x0, 0x6, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) socket$inet6_mptcp(0xa, 0x1, 0x106) 08:11:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_PMK(r0, 0x0, 0x0) [ 2216.057544][T26330] loop3: detected capacity change from 0 to 386 08:11:39 executing program 4: semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0xfff, 0x1800}, {}], 0x2, &(0x7f0000000040)) [ 2216.161910][T26330] Mount JFS Failure: -22 [ 2216.166438][T26330] jfs_mount failed w/return code = -22 08:11:39 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001d40)) 08:11:39 executing program 5: chdir(0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000200)) 08:11:39 executing program 2: semtimedop(0x0, &(0x7f0000002080)=[{}], 0x1, 0x0) [ 2216.362291][T26330] loop3: detected capacity change from 0 to 386 [ 2216.421298][T26330] Mount JFS Failure: -22 [ 2216.426064][T26330] jfs_mount failed w/return code = -22 08:11:39 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000006b580)) 08:11:39 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8006}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) [ 2216.839748][T26356] loop3: detected capacity change from 0 to 386 [ 2216.884342][T26356] Mount JFS Failure: -22 [ 2216.902662][T26356] jfs_mount failed w/return code = -22 [ 2216.958867][T26356] loop3: detected capacity change from 0 to 386 [ 2216.971167][T26356] Mount JFS Failure: -22 [ 2216.976344][T26356] jfs_mount failed w/return code = -22 08:11:40 executing program 0: syz_usb_connect(0x0, 0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e000000010902240001000000000904410017ff5d010009050f1f0100000000090583030091"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340), 0xc7c8, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000000)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}) 08:11:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f00000005c0)=[{&(0x7f00000002c0)="4430b0b9268a52c6936538d6d3167479c90a5fd4b7f4aa7fb8381936ad993d31368c29f1aabbb52509807bb5e3ab3037f1ab90a211b7b3d7ecd0a46eb242174af68d350d54c9d64e8987e4cd68743ee5847ea7520095a3ceff1e6ebcfa202b80363f0485a9d4082cc05f8af242e25451702647260cb85a2ccb243150ccbee1651e50fdb3784ca73747baba09a86a5d4398ac8c53b48e4a0641fa7074141fa963adb0eb71f32537a65c7d0888da5d337a46cf6540df4919d3d21d64", 0xbb}, {&(0x7f0000000380)="caf1ff1837a8b32fa51990c7cff997052cfa3c09c9c155b828c21355a8450415b5d8437ef48e51c3b95a815630b00388aeb59ba5d56ae1097671f9cea6697f9f426916ed2d285d4bb37df2893204896a0d4b8e212747f22b63fb4c113141", 0x5e}, {&(0x7f00000004c0)="be5d41699714538efa8b1f9a709344fb32fd181b999ef9e3a5b212cd1217ad057c2ae97bef368fdaf696438f9413", 0x2e}, {&(0x7f0000000200)="9ee9a774837a2d1cf43fa8d1f2732386c8ef4c4244e360b2678b86da40c229efb1bab7826fa1166a2bd86b164e63b2269303bdceca702c645233cd4e3a122415c74c45398b", 0x45}], 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 08:11:40 executing program 2: socket(0x10, 0x2, 0x0) r0 = creat(&(0x7f00000002c0)='./file0\x00', 0x31e) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0x16, 0x17, 0x0, {0xd, './file0/file0'}}, 0x16) write$binfmt_script(r0, &(0x7f0000001940)=ANY=[], 0x5a) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000940)={{}, 0x0, 0x6, @inherit={0x68, 0x0}, @devid}) r1 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141001) r2 = dup(r1) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0xfffffd2c) 08:11:40 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) 08:11:40 executing program 5: ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000240)={0x0, 0x0, "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", "9c862a0aea0367477c10047678dc927b82340deaf9cf3c24ff79c9fdea9d3dad492db528c1001023bf1a1b0f88721160f20a8dcbcd138572350e39054296ddb515669910a6b72a6c4475e0910027f4ef0039a79e3ee1132d3c033045b1770d96e4518e002ca65a2092099caa98fca76ae33218dbd86b874d3d74bc004ba9b6900c6e29546e61af029a1b310c5e870e95280e4ee5c6f424e172b8c608054bcdaca1ba254fbc6e39f10d75b2d78db63c6996e2b0990587d3359b708866b54ac170ebb60399dc03a51eedef5a2880da3874cdc743590a944eeabb00064e782f83845d7746f8df2d5e396cb3bfd43e85ad00ad361a53b6d8ca3e6f4088f22c4893d8ae5aad14f3451e3b9bf07df8d437e8cab527e59e083dd15f8aceb353ceabbc83c981860215b1ddddc84e46ba37dd9229e90462c7699be7078d61f1fa40c0935e69465619b9b4529a275247f0163c81dd5b5b41955e10a609781b402e3fb1e8cabb5911217d18e25fae202ea09e3d601d39c127d07dfd3ed8efe8787b2ff8423d765f463515016e36775ae6c124ed5412b37d9da8536d31fc86e57ba9a581550d9d5c84b22baf5a616c10d8ce9666c603bb7fa00478d914edad4b5ac5f9934809c4b9425a359eb8f56d241a9d419646c886e5154b0d415e273d85c738016c0963fff1ad4c1438b304e71ecba47ff3f8c588fc088de0193c5a3b93d260e2001dae5c5d8ca08b15241e582626a5b47df076d23ac5582fe77b82ed8d7c1df266247b7f5d8465c1072d427659e672219d3789c8f646dd44de33ae603f44ae231824a7d4d8c074147ed255d2a02d247188ca7fd0640e191f700a4ed97fe84ff266381e6385652b98c65723197d91b80bd22c6bffc9430af0b93ce2d8771e193edbebaa4beee9e8d08e21fdf20af800ee40593448042a14499a73a444b060295702a269794d8e445f7dd9757167767bd09a71564644fbc2943fdc96649c568a45a3fdab55497fccaad3faa6f74af5f3c2a0fe2c3bdc941ac6bdecf66929256547f8275336af3983adbd44f9426e9126c0100231724ed77440381925bcae26d0ef4d9f9a7fae4cc5fc190b49cfee6b5f171f69b3910cf792275f4abf8fe08cdbef76eedb2dd5d4a15bd506687147b5fcf82bdaf143c2b78efa0ff2e8427ca75ea2a42195000eef260ba218a0611f138233d118d1deef2c774ddebd41955a93596c056079d97d78025f3daba63f5777bc86db31ed4548236e696926e2f2ccd15f64c756f6ec85cb58bbce9705301f3255f6d105d4aeaeb65383b895ae5ee40538c0819fc37b9e1de3c89c359bf68ca17765d8dffec4bbe2ed5406865290b295b62db9642daf576678db769e8ab7933df4c8a6c1376c7c19fdcae8ace98f70c524ec04dd748b8212aa1b35f3635150ea49529b0bdbd1d4578cf0dfb9cadebe1837a8161d9f8ef60102239a998535957cbd37b6505a1920b2c59f1107b8942ab464f360282d6cd4672c31e054b8e3a97ece72363e74c04221e1e3bafc43ee3980b769028edae3f00ecbc7ad14da060d2126519b69aa92099ccf3f47fd54343480f6835180752f6a8fb78c71fd1568bc0048d75c7c32b49ed5a7eadabf9833bb756a23ab56b04acaaee47596ac9c3cd83ff2fd9c501eed32620f37ef7cf74474cd566e1b78d9ad6f22cad1560d674f8b0976c18b006f278ab73d53d3eb0e1adedb93dd9df742832ae67bb3ac2aa0cf226ba0885a2463f6f262563217587702d5ad7cd0b4500d255664ea8bebe59ff38870b36546392679b5965c448fd93814b17a424cf50485285f18b70aca542b31553ae9d1196d63e389b995410031fe228c20c2613561a6a499ed5c9999b7ff028a1e7605f18c630901ef2dea1dd7bee2080ec5c699897523fac5cf9e27b33fb2806041c76b330128ba644f03e0d2d0882dde1174f135e958dece99e94b91cc429f939715ec04128226fdb717d7308cf5f497efbec538a9088840317cf04231dfe9b76e95fe9d9a720158a8f4677fee18e337e2961f32502ddc596db24f90de1658f7012787ed56c9d9e66fa98f97a3c2e2e5757c2104daed9f8c167aff7a2a66929a626e0e8b3c8ba69850e4d98f1c6da082d067df5010e8c14b1e25c91d8896352ba44dd588ffbbdca9e8a2219a4484f8c031350409b4c497995ff8792acfc4b528df1a2bf3c9400b4d6dbe911ce5ddc70c67a335461cbb4902940be08ae8926080e868236cce22bd97b7444582476fc8ae0b7be26618e51cac0b62de81290fcd526160d2755a497b87b6ae57f292fdcab70857e40ac1f729bd88ea9d66086605eb16c7c54c4f090aa46daaf10326f7f60487f73d1a71e6e9532e986c90143573c30a26fd39f9eb2a6924eb7933316b60a0207024d8808b81cd2056084286fc3a0a897d00c9c459caac98b5afa4c413964e7b52a7fc1cc1589173e1a7a4ff60c22abdd2f854b878c34776f13a97ade6dbfdbd0dc5bed607398b0ee69075cbf4ac92806cb8fe3d434bd1830ea2c162fd648b99bfc6af356edea67a3eb089e9d08d6f81bc3674303e7cd4ed33e48845ada049067c116e77f32686001ae831eb07496795c2c7993d0f1ea035ac63578dbe3fdc519cb930922487a822a32ae576cfe07b1451b409dfce7c78f19a3c1695da890f9e5665579dba62339180038324e838b38822c448ee4bb1befe881b9b889486c74c4b286bf0e8f6673d0662f006b0156d097884a12473d5173d4c6f2a721c44398aa3af735df4b1f9074b9fb9e5b1cba1678ca325003aefd0d00029d9cab3db4b7e7ab2e922a3276495e4467ce664a62e636757b97e42be10a84a11339af4f7b2e9820ba25d40b9f5c466346b77979d4992bbaa6031d860e27f75667f8eaf2b8e299f9f082b1a9cb983d39e81d8baf565b320ac1d790f554e5009d5544bcbb603eca3c11061d0ca924eecad0fefd84803b814084ef91e8b766bdaaa049e8b8919cf7412d881fe5a3cc5ffc9eceec3e9e32a2725b8ec6ecd704a443d6e696f9011b1195b68cd7668db716bc40bda4b03682aca4a2e98a807cff1239de861ebf4a056be68e104374d45cadf13042de9156e3070b7f78dae7faeab8389aa5fce5f21e8ecdf9d864020e07a1bcd983a406fa6995c1809bdd97b67a85f3e31b6b068d3f94c96641d2af778ba6d67323fd09ff11243c601f32d47940f87e86d73dd682e25a182c9a06896eda814da25690eb701d8e7bc058e87aadee03d9a65d6d737beb9b7942bebb2a5803888b8ec7cc8bab40c29696362f6c6356e337762946e0970b85a1dc9ded2a1c82ff7aed5b40ef673d6e5f879892518418388845bf5cad506107ed3de5633a9995dfb5075f94b1e09868772501ccdcfdd4a68c02bea524e82a3f0d65b26ca1548aefbcd263ff7df12cee78d8ba7494a550f55f40ab97b9509e53c38c121bf2e08e9da5488efaa5289621e57a5f022d783f12e37a1c26dc6660be9a04a1b1556a251d668ff793f4a74729cf5be6b03b9117bb6316273c44f0efdfeb4b6c41f0c0de8abe36219ef64f1f5bd9584afcee9f600d609f0c6c698eb3d3bafb7eaea94849b7277ee1e894a71a7aa42a63d767fd339183f4d42ae4741a5875a19f93f81b22a7ff68017a1789f4a5ddc9466db8375816262829f5813382fbe138c068a5b5c19b5af5ec73b9d6dd80f149b0c9de24913412b48c9abc0e0f5e18755ba431adca8b8f4fbf2931467c2bbde05b6b615290fc37bdf2525da47a925909e6bb98653b0e8e998e6dfb801a24f0d506a7c196552844f19f2f5facbb690f7ef5c71dc9942bc65e3e2027e4d1eee8b32dfac369ae293dff31479c322fe75f7d9a44b5e9d82bb1a2564ab50f08d30a18db8e885a0e78f45d16f0a51fb8dcd05c234d3df2a7c40c20cad772d7ad8472c4c5fcbeefe308593444d0e8fbbaf5e9e99bcfd14b3d614da36d9dc35c85bf5323c656a984007241cd7bd7daa335d8647c9e75d57faef06b17a8db254e09ebe9117f374a7291168b1ad31807571ebe1c2fabf5e533ee3e894a2533f4a267cf6c007b94d1f6be30123233c2f69c30e5ad9b503a28b8b5eee67945681ad99c8b2e615dd6421fb19431dcad22952ce1e56e7c9b75c364eb2c7aff8a8dfdae6711389f29431eff586284b7d07ef50705cbf18eb220c44485d005a0327e968d0b0ae0a811574b36021c6175aadb7098fcbf2cde165894693953309d83e33834aa970c514a67429a90642e70578b22df3e0648bc858cd31349bb4b684c84e1c20e21b59ac0c7f29ee80704a7c88428113b611094d0b8ed4d8d9850e83eea097f1d906048fbb948006e10db59ca49f4240b2fc3f4d52bb0dea167024961708f11dcf5344b3cca06ed2b02169253eddc052df52755636008290d5f5caca9c95716a2f806672c9a8545315ecd85b68eb2a87612badaaf14ed2badd5bf041ad86a1106d5101162b8375c4a39d3ba9439dc2532122cbdf555e174b7a10c3346c4bc89c2bfbeb4da43bd1b7b1144a4f50bc1809a5859f8f7df08e09ab368612b9a45c2880715b24890455588a884923afe8c95db23703c4c42f515b1816c10aeec11fcb4baaf784977bb2555711122efd197b2d6f390f30cd2dc7da91efdbcde430b4d043edb4f645713384b8eacda879c319d2b0da0ab61ee8186baae5532d7e06909f014143e9fa4228b76cb87922fcb2c29666d1e0a8db1a3202c1fc321947f58fd071548af836d75cf47a5b4294a069037fead4157986abcaeb12732d179c6b5798990c9fd42125feb315683918d82b5021c8ce19226fde5b2a67ef23b1389db4867d946813158a8edadffa32aebe57bafe97b51ae873827d65cb5517c95c977e6012b33abf54fd8829b32bbdf4b4e1bdb47eeef6aaabf77ab59f46b69d8e9be29500658c59dd9c5b720bcf5ac24122676b8359265fc71490b446f11da0a45c829110984de029e52a6b9e36e1943440903e223273afe0cdca641d070abb0ed700ec40f82ca462bd234e02dd6de3bd34a110905cd9d60289ba908413eef592e193c980ba5b202bd1493a32c23f01e587955c92ce22a97240d6beea7591b75580fc6b062ce5861c04c33845a801aacb75e96f35fd1de2c5680bf8a930df0be2bc89e69a448022f9af9a4a5b5df0b65a1d7e0ea9a35aab63f6fdd83924ec28b8701d2928cc5ed5b6f0e43d371c8cc8517bde6683bde1bbce2275a54a049049b6b0748951db68e789e2542e86357a56a61cea5db3870971bfd78d5d1e7ef65a89264cec34e460bf53004b8fa277a11e89b92344c0ae107da7af5738cdfb100749e233d5bc847051e33cd93352829b603d67b0a3b4db78a33f4030a57b626a4de0fdddbb3a0d7f18eab2857b7967575b7726e1a572df88a994f1c6ce8589f02688195d2181ec8163db"}) openat$nvram(0xffffffffffffff9c, &(0x7f000000a2c0), 0x80842, 0x0) 08:11:40 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8007}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:40 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000880)={'ip6_vti0\x00', &(0x7f0000000800)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @remote}}) 08:11:40 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) r1 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) syncfs(r1) ioctl$USBDEVFS_SUBMITURB(r1, 0x8038550a, &(0x7f0000000200)=@urb_type_control={0x2, {0x3, 0x1}, 0x7, 0x26, &(0x7f00000000c0)={0x0, 0x18, 0x401, 0xfffe, 0x400}, 0x8, 0x6, 0x9, 0x0, 0x5, 0x16f2, &(0x7f0000000100)="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"}) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x17, 0x0, 0x0, 0x0, 0x0}) finit_module(0xffffffffffffffff, &(0x7f0000000080)='-&$\x00', 0x2) 08:11:40 executing program 1: perf_event_open(&(0x7f0000000340)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x0, 0x0, 0x0, &(0x7f0000000800)='GPL\x00', 0x0, 0xdf, &(0x7f0000000600)=""/223, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000700), 0x8, 0x10, &(0x7f0000000740)={0x0, 0x6, 0xf3a, 0xffff}, 0x10}, 0x78) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000140)=""/93) statfs(&(0x7f0000000040)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f00000003c0)=ANY=[], 0x9) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 2217.425941][T26374] loop3: detected capacity change from 0 to 386 [ 2217.469807][T26374] Mount JFS Failure: -22 08:11:40 executing program 2: r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x1}, 0x0, r0) [ 2217.529705][T26374] jfs_mount failed w/return code = -22 [ 2217.582160][T26374] loop3: detected capacity change from 0 to 386 [ 2217.591398][T26374] Mount JFS Failure: -22 [ 2217.595697][T26374] jfs_mount failed w/return code = -22 08:11:40 executing program 4: socket(0x0, 0x2, 0x0) execve(0x0, 0x0, 0x0) syz_open_dev$sndmidi(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 08:11:41 executing program 1: socketpair(0x2, 0x6, 0x0, &(0x7f0000000280)) [ 2217.959369][T17416] usb 1-1: new high-speed USB device number 107 using dummy_hcd [ 2218.209059][T17416] usb 1-1: Using ep0 maxpacket: 8 [ 2218.339255][T17416] usb 1-1: config 0 has an invalid interface number: 65 but max is 0 [ 2218.347422][T17416] usb 1-1: config 0 has no interface number 0 [ 2218.365232][T17416] usb 1-1: config 0 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 2218.400377][T17416] usb 1-1: config 0 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 2218.434522][T17416] usb 1-1: config 0 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 2218.536763][T17416] usb 1-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 2218.588560][T17416] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2218.633886][T17416] usb 1-1: config 0 descriptor?? [ 2218.737149][T17416] input: Generic X-Box pad as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.65/input/input20 08:11:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) getpeername$unix(r0, 0x0, 0x0) 08:11:42 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8008}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff030}, {0x6}]}, 0x10) 08:11:42 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x20000009}, 0x0) sched_setattr(0x0, &(0x7f0000000200)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x200000000011, r2, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) r3 = socket$phonet(0x23, 0x2, 0x1) r4 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240), 0x40, 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) io_submit(0x0, 0x4, &(0x7f00000006c0)=[0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x6, 0xb4f, r3, &(0x7f00000003c0)="92b4ea1df82789e4363c454975b09bca89e659393132d2bcba07880ba48a57cd6298cba5dd812ed73e76ab3d44a90deac07df3d7c886a449924021d642b44676ce1ed5177113b455eb98f6684c3fee256209a3fede98c57420ac19561925c7565f3495796eb7901512650e1955751ccc897f8c7a98615eec3c54eac2cf6df466bc24d566a700cb46ee26481c1bd18088f32e203644e73e3b28359fea54302f27ea6f9746934348ef810e5dccbf1a323b82c832843550b248ceb16e63c8c5dedb6f97c6bb377eeeaf029cc0a9fa0b905ca056b997256df0e4a95db47bab27b90f68c8ede8a3228733a237ed40a0b736", 0xef, 0x800, 0x0, 0x3}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0xa04, r4, &(0x7f00000004c0)="e59664a81f009ab91e5b79ca550df532f8c4b0eef9d0603533bc9cf45ab134ea82435752b916b0a7d16956dd0f3e40362c312f3457764ceea9240b9415ab0420c2404ccd98fc336dcd0d404c7db21535f869ddf1da5725d6fd006f6c8b7eb9c070d7444c7ddbdb92029db3d1bc851a78b1d137987db42bfb5752c0be9ca2a7ccf2b565cae22c336df81655dcd8adbc9953072915fb361983e88789db7c2ec98cf1c215b1c581617eb29b3aee63764933e904454d24b372bae0e1b04c946dec28e797e8c02ca797192ede9f33575e626381", 0xd1, 0xfffffffffffffac5, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000005c0)="e7d01b687d94f835709d7d78325bab60237d372d744ae09f95dd0eae9f52bfda0ac0138b69668a4809a9b0ac1739a002d1825b0bf1aa1a2b0bac43b97e9026bffff5765db5b961fc6e683d2245af40c4308f8fac5cbd9190317d9b931c1efc733fdaba743677167a9f1c046c17d8c169fd2b274bde3899bd487f5e256e314dca8822d394a4ae5c9505bf3c724baaea", 0x8f, 0x0, 0x0, 0x2, r5}]) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) sendto$inet6(r0, &(0x7f0000000200)="03", 0x7ffff000, 0x40080, 0x0, 0x1f4) pread64(0xffffffffffffffff, 0x0, 0x0, 0x1000) ioctl$VIDIOC_SUBDEV_G_SELECTION(0xffffffffffffffff, 0xc040563d, &(0x7f0000000000)={0x1, 0x0, 0x101, 0xf, {0xfff, 0x2, 0xa1ea}}) 08:11:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x8ec, &(0x7f00000004c0), &(0x7f00004c8000/0x3000)=nil, &(0x7f00004f4000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000540)) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r1, 0x7, &(0x7f0000000580), 0x1) 08:11:42 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000240)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) readv(r0, &(0x7f0000000140)=[{&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f0000002780)=""/4096, 0x1000}], 0x2) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/8, 0x8}], 0x1) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0x314aaee635b9c1b6, 0x0, 0x0, 0xfffffffffffffeeb) write(0xffffffffffffffff, &(0x7f0000000000)="15000000140007", 0x7) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="ffad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)) sendto$inet6(r1, &(0x7f0000000000)='6', 0x10a69, 0x10, 0x0, 0x4b6ae4f95a5de3b2) [ 2218.907260][ T9383] usb 1-1: USB disconnect, device number 107 [ 2218.919211][ C0] xpad 1-1:0.65: xpad_irq_out - usb_submit_urb failed with result -19 [ 2218.930637][ T9383] xpad 1-1:0.65: xpad_try_sending_next_out_packet - usb_submit_urb failed with result -19 08:11:42 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) 08:11:42 executing program 2: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240)=r0, 0x4) 08:11:42 executing program 1: clock_getres(0x2, &(0x7f0000005700)) 08:11:42 executing program 0: r0 = socket$qrtr(0x2a, 0x2, 0x0) recvmmsg(r0, &(0x7f00000051c0)=[{{&(0x7f0000000d40)=@in6={0xa, 0x0, 0x0, @empty}, 0x80, 0x0}}], 0x1, 0x0, &(0x7f00000053c0)) 08:11:42 executing program 4: signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendto$inet(r1, &(0x7f0000000000)="b026de404d8a6c2e52f024", 0xb, 0x0, &(0x7f0000000040)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) fstat(r3, 0x0) setreuid(0xffffffffffffffff, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="7406656e733d66642c7266646e6f3d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',euid=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) socket$inet(0x2, 0x2, 0x4) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f00000000c0)={r2, 0xaf7c, 0x3, 0xcd}) accept4$unix(r5, &(0x7f00000002c0)=@abs, &(0x7f0000000240)=0x6e, 0x0) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) [ 2219.182699][T26434] loop3: detected capacity change from 0 to 386 08:11:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r1}, 0x18) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000003c0)={0x0, {{0x2, 0x0, @private=0xa010102}}}, 0x88) sendmsg$can_j1939(r0, &(0x7f0000000180)={&(0x7f0000000040), 0x18, &(0x7f00000000c0)={&(0x7f0000000000), 0xffef}}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) fchmod(r3, 0x32) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) socket$netlink(0x10, 0x3, 0x0) sendmsg$can_j1939(r0, &(0x7f0000000680)={&(0x7f00000005c0)={0x1d, 0x0, 0x1, {0x2, 0xff, 0x1}, 0xff}, 0x18, &(0x7f0000000640)={0x0}}, 0x4020000) [ 2219.302018][T26434] Mount JFS Failure: -22 08:11:42 executing program 1: socket$l2tp6(0xa, 0x2, 0x88) [ 2219.362640][T26434] jfs_mount failed w/return code = -22 [ 2219.657839][T26434] loop3: detected capacity change from 0 to 386 [ 2219.672267][T26434] Mount JFS Failure: -22 [ 2219.676544][T26434] jfs_mount failed w/return code = -22 08:11:43 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8009}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:43 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000300)={'wlan1\x00'}) 08:11:43 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000001ec0)='ns/cgroup\x00') 08:11:43 executing program 1: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) write$P9_RREMOVE(r0, &(0x7f0000000080)={0x7}, 0x7) 08:11:43 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000055c0)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 08:11:43 executing program 5: syz_open_dev$cec(&(0x7f0000000480), 0x2, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) 08:11:43 executing program 4: r0 = socket$qrtr(0x2a, 0x2, 0x0) getsockname$qrtr(r0, &(0x7f0000004480), &(0x7f00000044c0)=0xc) 08:11:43 executing program 0: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000440), 0x202c0, 0x0) 08:11:43 executing program 1: connect$x25(0xffffffffffffffff, 0x0, 0x0) 08:11:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(r0, &(0x7f0000008400)={&(0x7f0000008200), 0xc, 0x0}, 0x0) [ 2220.079120][T26471] loop3: detected capacity change from 0 to 386 08:11:43 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000004a00)=ANY=[@ANYBLOB='codepage=8']) [ 2220.243388][T26471] Mount JFS Failure: -22 08:11:43 executing program 0: semtimedop(0x0, &(0x7f00000001c0)=[{0x0, 0x6, 0x800}], 0x1, &(0x7f0000000200)={0x77359400}) [ 2220.279982][T26471] jfs_mount failed w/return code = -22 [ 2220.391631][T26471] loop3: detected capacity change from 0 to 386 [ 2220.418854][T26471] Mount JFS Failure: -22 [ 2220.446121][T26486] loop4: detected capacity change from 0 to 6 [ 2220.453524][T26471] jfs_mount failed w/return code = -22 08:11:43 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x800a}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:43 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) write$khugepaged_scan(r0, &(0x7f0000000100), 0x8) 08:11:43 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r0, 0x5603, 0xffffffffffffffff) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x5603, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) fdatasync(r1) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) mremap(&(0x7f00009bf000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f00008e2000/0x2000)=nil) 08:11:43 executing program 4: syz_mount_image$pvfs2(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ocfs2\x00', 0x0, 0x0) [ 2220.618600][T26486] FAT-fs (loop4): codepage cp8 not found 08:11:44 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x68000400) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x2, 0x800) request_key(&(0x7f0000000240)='keyring\x00', 0x0, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0xffffffffffffffff, 0x0, 0x0) 08:11:44 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(r0, 0x3312, 0x0) 08:11:44 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180), 0xa081, 0x0) ioctl$SNAPSHOT_FREE(r0, 0x3305) 08:11:44 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x0, 0x0, 0xffffffe1}, 0x40) 08:11:44 executing program 4: io_uring_setup(0x7e8f, &(0x7f000000a4c0)={0x0, 0x2a78, 0x8}) 08:11:44 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080), 0x0, 0x0) r1 = socket(0x2, 0x5, 0x0) syz_open_dev$ndb(&(0x7f0000000040), 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x437) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) [ 2220.945420][T26505] loop3: detected capacity change from 0 to 386 [ 2221.011492][T26505] Mount JFS Failure: -22 08:11:44 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000180), 0x0, 0x2) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f00000001c0)={0x0, 0x3, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6eca235a"}, 0x0, 0x0, @userptr}) [ 2221.048915][T26505] jfs_mount failed w/return code = -22 08:11:44 executing program 4: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000240)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000640)) tkill(r0, 0x7) [ 2221.279799][T26505] loop3: detected capacity change from 0 to 386 [ 2221.319579][T26505] Mount JFS Failure: -22 [ 2221.359806][T26505] jfs_mount failed w/return code = -22 08:11:44 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x800b}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:44 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x20000009}, 0x0) sched_setattr(0x0, &(0x7f0000000200)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1000, 0x9, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x200000000011, r2, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="2ad64e75dc862951c4dd74ea2f342443b8f15269af7e7f4b5c716c80a3b2e4fc01e8ed739ff3336b5cd8757359bc69a3d5a377db24a22c4cf63d40b5ce62e441dd1ebf03d4ef13f853cb2c861188e039f89163f15bae004da8adccff5c53d46e19059f5a6df44f491edb7d7ae1493c84af5d000200004596a24533ffd3bad5d608b584242b3a451f0e50d31340fbb8c554105789862b60df74f940f02278e50c5ac4afd11510904654b3ca6635bce9b8", @ANYRESHEX], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) r3 = socket$phonet(0x23, 0x2, 0x1) r4 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240), 0x40, 0x0) io_submit(0x0, 0x4, &(0x7f00000006c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x5, 0x3, r1, &(0x7f0000000100)="691fd89f7be2e35201958bc0b26a38c34e4d06a4901721fede7b7428834f7a9154a07aa86aa7a63ea8f7a8f65f0a9b3639a6ddcdfc8f", 0x36, 0xfffffffffffffffb}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x6, 0xb4f, r3, &(0x7f00000003c0)="92b4ea1df82789e4363c454975b09bca89e659393132d2bcba07880ba48a57cd6298cba5dd812ed73e76ab3d44a90deac07df3d7c886a449924021d642b44676ce1ed5177113b455eb98f6684c3fee256209a3fede98c57420ac19561925c7565f3495796eb7901512650e1955751ccc897f8c7a98615eec3c54eac2cf6df466bc24d566a700cb46ee26481c1bd18088f32e203644e73e3b28359fea54302f27ea6f9746934348ef810e5dccbf1a323b82c832843550b248ceb16e63c8c5dedb6f97c6bb377eeeaf029cc0a9fa0b905ca056b997256df0e4a95db47bab27b90f68c8ede8a3228733a237ed40a0b736", 0xef, 0x800, 0x0, 0x3}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xe, 0xa04, r4, &(0x7f00000004c0)="e59664a81f009ab91e5b79ca550df532f8c4b0eef9d0603533bc9cf45ab134ea82435752b916b0a7d16956dd0f3e40362c312f3457764ceea9240b9415ab0420c2404ccd98fc336dcd0d404c7db21535f869ddf1da5725d6fd006f6c8b7eb9c070d7444c7ddbdb92029db3d1bc851a78b1d137987db42bfb5752c0be9ca2a7ccf2b565cae22c336df81655dcd8adbc9953072915fb361983e88789db7c2ec98cf1c215b1c581617eb29b3aee63764933e904454d24b372bae0e1b04c946dec28e797e8c02ca797192ede9f33575e6263810b2c1e3f66b5763ec5474ad20ecaef178345a40cf3f535f5f12eb2d4a3a4", 0xef, 0xfffffffffffffac5, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0xff, r1, &(0x7f00000005c0)="e7d01b687d94f835709d7d78325bab60237d372d744ae09f95dd0eae9f52bfda0ac0138b69668a4809a9b0ac1739a002d1825b0bf1aa1a2b0bac43b97e9026bffff5765db5b961fc6e683d2245af40c4308f8fac5cbd9190317d9b931c1efc733fdaba743677167a9f1c046c17d8c169fd2b274bde3899bd487f5e256e314dca8822d394a4ae5c9505bf3c724baaea22", 0x90, 0x400, 0x0, 0x2}]) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x0, 0x40, 0x8, 0x9}, 0x0) sendto$inet6(r0, &(0x7f0000000200)="03", 0x7ffff000, 0x40080, 0x0, 0x1f4) pread64(0xffffffffffffffff, 0x0, 0x0, 0x1000) socket(0x10, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(0xffffffffffffffff, 0xc040563d, &(0x7f0000000000)={0x1, 0x0, 0x101, 0xf, {0xfff, 0x2, 0xa1ea, 0x10000}}) 08:11:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) 08:11:44 executing program 0: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000040)=@framed={{}, [@jmp]}, &(0x7f0000000080)='syzkaller\x00', 0x3fffc, 0x89, &(0x7f00000000c0)=""/137, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:11:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@window, @timestamp, @mss, @window, @sack_perm, @sack_perm, @timestamp, @sack_perm, @timestamp], 0x1ffffffffffffe62) 08:11:44 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) 08:11:44 executing program 0: r0 = socket(0x1, 0x5, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0xffffffffffffffae) 08:11:44 executing program 1: r0 = socket(0x1, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0xffffffb3) 08:11:44 executing program 2: r0 = socket(0x1, 0x5, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe6f) 08:11:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f00000011c0)={0x2, 0x0, @local}, 0x10) [ 2221.804575][T26540] loop3: detected capacity change from 0 to 386 08:11:45 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) recvmsg(r0, 0x0, 0x0) 08:11:45 executing program 0: r0 = socket(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) [ 2222.011045][T26540] Mount JFS Failure: -22 [ 2222.052416][T26540] jfs_mount failed w/return code = -22 [ 2222.159367][T26540] loop3: detected capacity change from 0 to 386 [ 2222.171667][T26540] Mount JFS Failure: -22 [ 2222.201894][T26540] jfs_mount failed w/return code = -22 08:11:45 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x800c}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:45 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000140)="9e", 0x1) 08:11:45 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000240), 0x4) 08:11:45 executing program 2: r0 = socket(0x1, 0x5, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 08:11:45 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2222.312065][ T3226] ieee802154 phy0 wpan0: encryption failed: -22 [ 2222.319125][ T3226] ieee802154 phy1 wpan1: encryption failed: -22 08:11:45 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) 08:11:45 executing program 2: socketpair(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0) 08:11:45 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000011c0)={0x2, 0x0, @local}, 0x10) 08:11:45 executing program 0: shmctl$SHM_INFO(0xffffffffffffffff, 0xe, &(0x7f0000000000)=""/23) [ 2222.641444][T26569] loop3: detected capacity change from 0 to 386 08:11:46 executing program 5: clock_gettime(0x74d167f9ddd18061, 0x0) 08:11:46 executing program 4: r0 = socket(0x1, 0x3, 0x0) fstat(r0, &(0x7f0000000080)) [ 2222.796376][T26569] Mount JFS Failure: -22 08:11:46 executing program 1: r0 = socket(0x1, 0x5, 0x0) sendmsg$inet6(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) [ 2222.888162][T26569] jfs_mount failed w/return code = -22 [ 2222.937999][T26569] loop3: detected capacity change from 0 to 386 [ 2222.962153][T26569] Mount JFS Failure: -22 [ 2222.966581][T26569] jfs_mount failed w/return code = -22 08:11:46 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x800d}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:46 executing program 0: r0 = socket(0x1, 0x5, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, 0x0, 0x0) 08:11:46 executing program 2: r0 = socket(0x1, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000000)='.', 0x1) 08:11:46 executing program 1: r0 = socket(0x10, 0x3, 0x0) getpeername(r0, 0x0, &(0x7f00000001c0)) 08:11:46 executing program 5: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x80504, 0x0) 08:11:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f0000000180)=0x3, 0x4) 08:11:46 executing program 0: setxattr$system_posix_acl(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 08:11:46 executing program 2: socketpair(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendto$packet(r0, &(0x7f0000000040)="d4", 0x1, 0x20040094, 0x0, 0xffffffffffffff94) 08:11:46 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) 08:11:46 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0xa, 0x4e22, 0x0, @dev}, 0x1c, 0x0}, 0x80) [ 2223.479799][T26606] loop3: detected capacity change from 0 to 386 08:11:46 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) 08:11:46 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) [ 2223.687971][T26606] Mount JFS Failure: -22 [ 2223.714055][T26606] jfs_mount failed w/return code = -22 [ 2223.808490][T26606] loop3: detected capacity change from 0 to 386 [ 2223.855915][T26606] Mount JFS Failure: -22 [ 2223.929174][T26606] jfs_mount failed w/return code = -22 08:11:47 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x800f}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:47 executing program 0: mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7d23e97eec0f7b1) 08:11:47 executing program 2: socketpair(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x40000101) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 08:11:47 executing program 4: r0 = socket(0x1, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000240), 0x0) [ 2224.346792][T26633] loop3: detected capacity change from 0 to 386 [ 2224.431396][T26633] Mount JFS Failure: -22 [ 2224.435741][T26633] jfs_mount failed w/return code = -22 [ 2224.539370][T26633] loop3: detected capacity change from 0 to 386 [ 2224.566606][T26633] Mount JFS Failure: -22 [ 2224.599102][T26633] jfs_mount failed w/return code = -22 08:11:48 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 08:11:48 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$CHAR_RAW_DISCARD(r0, 0x5451, 0x0) 08:11:48 executing program 0: r0 = socket(0x10, 0x3, 0x0) getpeername(r0, 0x0, 0x0) 08:11:48 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) 08:11:48 executing program 2: r0 = socket(0x10, 0x3, 0x0) getpeername(r0, 0x0, &(0x7f0000000040)=0xfffffffffffffd5b) 08:11:48 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8010}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:48 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, 0x0, 0x0) 08:11:48 executing program 0: r0 = socket(0x1, 0x5, 0x0) sendto$packet(r0, &(0x7f00000041c0), 0x0, 0x0, &(0x7f0000004280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="f9076807fb20"}, 0x14) 08:11:48 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, 0x0) 08:11:48 executing program 2: socketpair(0x1, 0x3, 0x0, &(0x7f0000000400)) 08:11:48 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) 08:11:48 executing program 0: socketpair(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$packet(r0, &(0x7f0000000040)="e55552a600ecd7c25a3c2a296e1126ba0000a1b9aa7bfa9a2e443ee99433671f02000000001c7c8426716139bad366e633ef026ac174f40918c345f8eae8cf0bc141f2a6c484023f4e8d5ce2006f94715e0fe81f26d205be5af45c137756c496379ec0c4ba8a7a50ab595701a83243f585cd00"/128, 0x1, 0x20040041, 0x0, 0x4d) [ 2225.064805][T26659] loop3: detected capacity change from 0 to 386 [ 2225.103835][T26659] Mount JFS Failure: -22 [ 2225.108393][T26659] jfs_mount failed w/return code = -22 [ 2225.209673][T26659] loop3: detected capacity change from 0 to 386 [ 2225.218234][T26659] Mount JFS Failure: -22 [ 2225.223062][T26659] jfs_mount failed w/return code = -22 08:11:49 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_opts(r0, 0x0, 0x1f, 0x0, 0x0) 08:11:49 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8011}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:49 executing program 2: r0 = socket(0x1, 0x5, 0x0) sendmmsg$inet(r0, &(0x7f00000023c0)=[{{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000040)="19", 0x1}], 0x1}}], 0x1, 0x0) 08:11:49 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f00000000c0)='o', 0x1) 08:11:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x5, &(0x7f0000001240), &(0x7f0000002bc0)=0x4) 08:11:49 executing program 4: select(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x6}, 0x0, 0x0) 08:11:49 executing program 0: r0 = socket(0x1, 0x5, 0x0) sendto$packet(r0, &(0x7f00000041c0), 0x0, 0x0, 0x0, 0x0) 08:11:49 executing program 2: r0 = socket(0x1, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000080)='1', 0x1}], 0x1}, 0x0) 08:11:49 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x12, &(0x7f0000000040), 0x4) 08:11:49 executing program 4: socketpair(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x100) [ 2226.405717][T26689] loop3: detected capacity change from 0 to 386 [ 2226.444377][T26689] Mount JFS Failure: -22 [ 2226.450960][T26689] jfs_mount failed w/return code = -22 [ 2226.509272][T26689] loop3: detected capacity change from 0 to 386 [ 2226.522936][T26689] Mount JFS Failure: -22 [ 2226.527580][T26689] jfs_mount failed w/return code = -22 08:11:49 executing program 1: mlock2(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x1) 08:11:49 executing program 4: semget(0x1, 0x0, 0x200) 08:11:50 executing program 5: mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x8) 08:11:50 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000000)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffed9}}], 0x1, 0x0) 08:11:50 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8023}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0xf7d2c67a) 08:11:50 executing program 1: r0 = socket(0x1, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x0, 0x0, 0x0) 08:11:50 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvmsg(r0, &(0x7f0000001680)={0x0, 0x0, 0x0}, 0x2042) 08:11:50 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) close(r0) openat$null(0xffffffffffffff9c, &(0x7f0000000a40), 0x0, 0x0) fgetxattr(r0, &(0x7f0000000ac0)=@random={'trusted.', '/dev/null\x00'}, 0x0, 0x0) 08:11:50 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, 0x0, 0x0) 08:11:50 executing program 2: r0 = socket(0x1, 0x5, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000000100)="2089801eeae4b46b4f47c18e18d4901e89be1ed0f0c4cb1ad488df0f0b671d079c188a4c2dc23c6b3f6899c6e87a0017ebf375b763cb07c4c9547a2376cb2a805c00d04099d08d3cba04bd2466697cfafb6d27f96d19c9ff57cb99c028210b4d7808db1ae6c6da1279351539894ce84526ec02f29fde4dd3cbfd0c12802b33209cef1bf88995462ddcee6f345f3cee7cd7e75e691295ea598c982694a410d51909"}, {&(0x7f00000001c0)="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"}, {&(0x7f00000011c0)="53d377c3f56cf32b3e23d55d97c98a45cb20c33feb4abc66fdc44156d113612d0210a1029834e5a9b160a8efe71498218cea496bda865bf08ddee6311d32f3954c8f74bff0b65ba10024404742ec5f7709c937b667252d90c1de5f42172a2f7c2b8f9b1129c6b2a21d7d789905f90606edfac0dd6a11b973076084607bb1298fc3aa49f2d8817b12b739ac8429593d"}, {&(0x7f0000001280)="c224485ae0bace740d961bb03889f4cc6bedf3421fa157168c09f6ea27c0031809f643103e00754fe75acd5347e309b3356782f8b719e6b57dd4961b9fd750c5b7d97190f0e4dfbab7bd011a438de0a0c7cbd39efe5bb40236d8a1b05fc7d6e70e46e0a8b6c72667533446e429ea048b5184ef28dd7eef3e0faadcebe760dd1f160283615443c03c19556675f94746baef724a0ae2e94a14cbbf5ab439aae1b3487c9cd6f892e361fcb42ec1898bda492b08da210e48e1e01be3a312dc6bb8e5fc6c"}], 0x1000000000000004}, 0x0) 08:11:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000004c40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 2227.355049][T26722] loop3: detected capacity change from 0 to 386 08:11:50 executing program 5: r0 = socket(0x1, 0x5, 0x0) sendto$packet(r0, 0x0, 0x0, 0x8015, 0x0, 0xff6f) [ 2227.476714][T26722] Mount JFS Failure: -22 08:11:50 executing program 2: mremap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f0000ffd000/0x3000)=nil) [ 2227.529910][T26722] jfs_mount failed w/return code = -22 08:11:50 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000100)={{{@in6=@remote, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000000000)=0xffffffffffffff83) 08:11:50 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0xb, 0x0, &(0x7f00000010c0)) [ 2227.622362][T26722] loop3: detected capacity change from 0 to 386 [ 2227.716435][T26722] Mount JFS Failure: -22 [ 2227.780902][T26722] jfs_mount failed w/return code = -22 08:11:51 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8048}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:51 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) 08:11:51 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000080)={@mcast1}, 0x14) 08:11:51 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) ioctl$CHAR_RAW_BSZSET(r0, 0x5451, 0x0) 08:11:51 executing program 1: r0 = socket(0x1, 0x5, 0x0) sendmmsg$inet6(r0, &(0x7f0000000e80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8000) 08:11:51 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x53) 08:11:51 executing program 0: r0 = socket(0x1, 0x5, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x1, 0x0, 0xffffffd7}, 0x0) 08:11:51 executing program 2: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000300)='syz0\x00', 0x200002, 0x0) 08:11:51 executing program 4: socketpair(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$packet(r0, &(0x7f0000000280)="08b6db4e620900f3ffffff00007615021351ecec", 0x0, 0x8044, 0x0, 0xfffffffffffffe50) [ 2228.258464][T26760] loop3: detected capacity change from 0 to 386 08:11:51 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getsockname$inet(r0, 0x0, 0x0) [ 2228.306949][T26760] Mount JFS Failure: -22 [ 2228.312624][T26760] jfs_mount failed w/return code = -22 08:11:51 executing program 5: r0 = socket(0x1, 0x1, 0x0) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{}, "1cc6d328469b61f7", "a86af9cbc4deb61f78e902e64ab7e951e45597191c768f543b669b6d7192b028", "d49cfb93", "ef47d9684c8f29a4"}, 0x38) 08:11:51 executing program 2: socketpair(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$packet(r0, &(0x7f0000000440), 0x0, 0x44015, 0x0, 0x0) [ 2228.412332][T26760] loop3: detected capacity change from 0 to 386 [ 2228.452343][T26760] Mount JFS Failure: -22 [ 2228.520326][T26760] jfs_mount failed w/return code = -22 08:11:51 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x804c}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:51 executing program 0: socketpair(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$packet(r0, &(0x7f0000000140)="d03eab6402c60000fb5580dbf9152dc095926c195dcc81f87303b9ab22ad24019001a0dc09f996b00f7e8711d0ddf03ee2f00749a1b48e4163c3b92a853a59a76f82f08cf6dc", 0x0, 0x20044041, 0x0, 0x52) 08:11:51 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, 0x0, 0x0) 08:11:51 executing program 1: r0 = socket(0x1, 0x5, 0x0) sendto$packet(r0, &(0x7f00000041c0), 0x0, 0x800, 0x0, 0x0) 08:11:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, 0x0, 0xffffffffffffff2f) 08:11:52 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)="93", 0x1) 08:11:52 executing program 0: socket(0x11, 0x3, 0x20000008) 08:11:52 executing program 2: semget(0x1, 0x1, 0x382) 08:11:52 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1b, 0x0, 0x0) 08:11:52 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x9, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 2228.955876][T26793] loop3: detected capacity change from 0 to 386 08:11:52 executing program 0: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000000)=""/107) 08:11:52 executing program 0: socketpair(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendto$packet(r0, &(0x7f0000000440), 0x0, 0x4050, 0x0, 0xfffffffffffffd31) [ 2229.078792][T26793] Mount JFS Failure: -22 [ 2229.114163][T26793] jfs_mount failed w/return code = -22 [ 2229.235342][T26793] loop3: detected capacity change from 0 to 386 [ 2229.267948][T26793] Mount JFS Failure: -22 [ 2229.301324][T26793] jfs_mount failed w/return code = -22 08:11:52 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8060}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:52 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup2(r0, r1) fgetxattr(r1, &(0x7f0000000000)=@known='trusted.overlay.origin\x00', 0x0, 0x0) 08:11:52 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvmsg(r0, 0x0, 0x40010000) 08:11:52 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000100)=""/92, &(0x7f0000000180)=0x5c) 08:11:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xd, &(0x7f00000001c0)=""/4096, &(0x7f00000011c0)=0x1000) 08:11:52 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) 08:11:52 executing program 2: semget(0x0, 0x2, 0x382) 08:11:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000001100)="e0", 0x1) 08:11:52 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0xfffffffffffffcc6) 08:11:52 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f00000001c0)={@broadcast, @local, @dev}, 0xc) 08:11:53 executing program 2: socketpair(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$packet(r0, &(0x7f0000000440)="cd", 0x1, 0x44015, 0x0, 0x0) [ 2229.709467][T26823] loop3: detected capacity change from 0 to 386 08:11:53 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, 0x0, 0x0) [ 2229.776408][T26823] Mount JFS Failure: -22 [ 2229.824023][T26823] jfs_mount failed w/return code = -22 [ 2229.926315][T26823] loop3: detected capacity change from 0 to 386 [ 2229.953331][T26823] Mount JFS Failure: -22 [ 2229.958469][T26823] jfs_mount failed w/return code = -22 08:11:53 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8068}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:53 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet(r0, 0x0, 0x0) 08:11:53 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) 08:11:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r0, &(0x7f0000000000)) 08:11:53 executing program 4: r0 = semget(0x1, 0x0, 0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000100)={{0x0, 0xee00, 0x0, 0xffffffffffffffff}}) 08:11:53 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) 08:11:53 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x0, 0x0, 0x0) 08:11:53 executing program 4: r0 = socket(0x1, 0x5, 0x0) sendto$packet(r0, 0x0, 0x0, 0x40000d4, 0x0, 0xffffffffffffffd6) 08:11:53 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bind$packet(r0, 0x0, 0x0) 08:11:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x0, 0xfffffffffffffffd, 0x0) [ 2230.238330][T26856] loop3: detected capacity change from 0 to 386 08:11:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x0, 0x0, 0xe) 08:11:53 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000900), 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, 0x0, 0x0) [ 2230.360571][T26856] Mount JFS Failure: -22 [ 2230.425237][T26856] jfs_mount failed w/return code = -22 08:11:53 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x806c}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:53 executing program 4: semget(0x2, 0x1, 0x424) 08:11:53 executing program 2: r0 = socket(0x1, 0x5, 0x0) sendto$packet(r0, 0x0, 0x0, 0x880, 0x0, 0xfffffffffffffe6f) 08:11:53 executing program 1: r0 = socket(0x1, 0x2, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, 0x0, 0xfc9d) 08:11:53 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) 08:11:53 executing program 4: r0 = socket(0x1, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 08:11:53 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) 08:11:53 executing program 2: r0 = socket(0x1, 0x5, 0x0) sendto$packet(r0, 0x0, 0x0, 0x20008015, 0x0, 0xffffffffffffffd2) 08:11:54 executing program 0: socketpair(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$packet(r1, &(0x7f0000000280)='\b', 0x1, 0x0, 0x0, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)=@xdp, 0x80) [ 2230.701058][T26880] loop3: detected capacity change from 0 to 386 [ 2230.721931][T26880] Mount JFS Failure: -22 [ 2230.726759][T26880] jfs_mount failed w/return code = -22 [ 2230.801385][T26880] loop3: detected capacity change from 0 to 386 [ 2230.811628][T26880] Mount JFS Failure: -22 [ 2230.817433][T26880] jfs_mount failed w/return code = -22 08:11:54 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) r2 = socket(0x1, 0x5, 0x0) dup3(r1, r2, 0x0) r3 = accept$inet6(r2, 0x0, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x69) signalfd(r3, &(0x7f0000000080), 0x8) 08:11:54 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) fstat(r0, &(0x7f0000000500)) 08:11:54 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) 08:11:54 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8074}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:54 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, 0x0, 0xffffffffffffffcf) 08:11:54 executing program 0: select(0x40, &(0x7f0000000040)={0xb2}, 0x0, 0x0, 0x0) 08:11:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 08:11:54 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmsg(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)=""/14, 0xe}, {&(0x7f00000000c0)=""/15, 0xf}, {&(0x7f0000000200)=""/69, 0x45}], 0x3, &(0x7f0000000180)=""/2, 0xffffffffffffffb9}, 0x0) 08:11:54 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000000)=0xffffff48) 08:11:54 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000000)=0x81, 0x4) 08:11:54 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect(r0, &(0x7f0000000100)=@l2tp={0x2, 0x0, @remote}, 0x80) 08:11:54 executing program 0: socketpair(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/119, 0x77}], 0x1}, 0x100) sendto$packet(r1, &(0x7f0000000040)="d4", 0x1, 0x0, 0x0, 0x0) [ 2231.479387][T26911] loop3: detected capacity change from 0 to 386 [ 2231.529573][T26911] Mount JFS Failure: -22 08:11:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet(r0, 0x0, 0x0, 0xc0) [ 2231.577337][T26911] jfs_mount failed w/return code = -22 08:11:55 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xa00, 0x0) 08:11:55 executing program 1: r0 = socket(0x1, 0x5, 0x0) sendto$packet(r0, 0x0, 0x0, 0x850, 0x0, 0x0) [ 2231.710395][T26911] loop3: detected capacity change from 0 to 386 [ 2231.720723][T26911] Mount JFS Failure: -22 [ 2231.725024][T26911] jfs_mount failed w/return code = -22 08:11:55 executing program 5: semget(0x1, 0x0, 0x508) 08:11:55 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x807a}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:55 executing program 4: socketpair(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$packet(r0, &(0x7f0000000080)="d4", 0x1, 0x400c4, 0x0, 0x0) 08:11:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect(r0, &(0x7f0000000000)=@un=@abs, 0x80) 08:11:55 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0) 08:11:55 executing program 1: socketpair(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$inet(r0, &(0x7f0000003280)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc0) 08:11:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvfrom(r0, 0x0, 0x0, 0x40, 0x0, 0x0) 08:11:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet(r0, 0x0, 0x0, 0x4000) 08:11:55 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, 0x0, 0x0) 08:11:55 executing program 1: socketpair(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x2000) 08:11:55 executing program 0: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000100), 0x193900, 0x0) 08:11:55 executing program 2: r0 = syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200020000100010005000000001c08107f13", 0x12, 0x400}, {&(0x7f0000010100)="ff000000feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff03f0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed415cf970000000e7c2645f5303050000000000000000000000000000000000ed41000040000000e7c2645f0002", 0x82e, 0x800}, {&(0x7f0000010a00)="01002e0000000000000000000000000001002e2e000000000000000000000000020066696c6530", 0x27, 0x1400}], 0x0, &(0x7f0000000300)=ANY=[]) r1 = dup2(r0, r0) utimensat(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x1100) [ 2232.239647][T26949] loop3: detected capacity change from 0 to 386 [ 2232.399120][T26949] Mount JFS Failure: -22 [ 2232.439417][T26949] jfs_mount failed w/return code = -22 [ 2232.526355][T26949] loop3: detected capacity change from 0 to 386 08:11:55 executing program 5: socketpair(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$packet(r0, &(0x7f0000000040)="d4", 0x1, 0x4c084, 0x0, 0x0) [ 2232.572590][T26949] Mount JFS Failure: -22 [ 2232.577182][T26949] jfs_mount failed w/return code = -22 08:11:55 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x80fe}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000001c0)={@mcast1}, 0x14) 08:11:55 executing program 1: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000140)) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7}, 0x69ff9a93bfc25838) write$P9_RAUTH(r0, &(0x7f0000000200)={0x14}, 0x14) close(r0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) socket$inet_udp(0x2, 0x2, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 08:11:55 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000), 0x1ffffffffffffcaa) 08:11:55 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, 0x0, 0x0) 08:11:56 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000002f80)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}}], 0x1, 0x80) 08:11:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, 0x0, 0x0, 0x80) 08:11:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 08:11:56 executing program 0: socketpair(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 08:11:56 executing program 1: semget(0x2, 0x2, 0x259) 08:11:56 executing program 2: socketpair(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$packet(r0, &(0x7f0000000440), 0x0, 0x44015, 0x0, 0x4) [ 2232.936090][T26985] loop3: detected capacity change from 0 to 386 [ 2232.995046][T26985] Mount JFS Failure: -22 08:11:56 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvmsg(r0, &(0x7f0000001680)={0x0, 0x0, 0x0}, 0x0) [ 2233.041470][T26985] jfs_mount failed w/return code = -22 [ 2233.128408][T26985] loop3: detected capacity change from 0 to 386 [ 2233.151094][T26985] Mount JFS Failure: -22 [ 2233.155406][T26985] jfs_mount failed w/return code = -22 08:11:56 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:56 executing program 4: r0 = socket(0x1, 0x5, 0x0) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) 08:11:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup2(r1, r0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) 08:11:56 executing program 1: mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x200000a) 08:11:56 executing program 2: shmget(0x0, 0x3000, 0x200, &(0x7f0000ffd000/0x3000)=nil) 08:11:56 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) 08:11:56 executing program 0: r0 = socket(0x1, 0x5, 0x0) sendto$packet(r0, 0x0, 0x0, 0x20040010, 0x0, 0xfffffffffffffdfc) 08:11:56 executing program 4: semget(0x1, 0x0, 0x101) 08:11:56 executing program 2: socketpair(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$packet(r0, &(0x7f0000000440)="cd", 0x1, 0x0, 0x0, 0x0) 08:11:56 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) 08:11:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) [ 2233.444875][T27014] loop3: detected capacity change from 0 to 386 [ 2233.558639][T27014] Mount JFS Failure: -22 [ 2233.564987][T27014] jfs_mount failed w/return code = -22 [ 2233.610105][T27014] loop3: detected capacity change from 0 to 386 [ 2233.623699][T27014] Mount JFS Failure: -22 [ 2233.636520][T27014] jfs_mount failed w/return code = -22 08:11:57 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000100)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) 08:11:57 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) 08:11:57 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000140), &(0x7f0000000180)=0x4) 08:11:57 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000240)=@gcm_256={{}, "b75e953268121bf2", "a5bba9587cbb44e506ff1eaecedda5500d30fb5c1f437ee57f94c25b1da04218", "b6bf2e53", "822448c666504ffa"}, 0x38) 08:11:57 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bind(r0, &(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x80) 08:11:57 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xff00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:57 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, 0x0) 08:11:57 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect(r0, &(0x7f00000000c0)=@in={0x2, 0x0, @local}, 0x80) 08:11:57 executing program 2: r0 = socket(0x1, 0x5, 0x0) sendto$packet(r0, 0x0, 0x0, 0x800, &(0x7f0000004280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="f9076807fb20"}, 0x14) 08:11:57 executing program 4: r0 = socket(0x1, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000240)="1e", 0x1) 08:11:57 executing program 0: socketpair(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendto$packet(r0, 0x0, 0x0, 0x60004004, 0x0, 0xfffffffffffffd75) [ 2233.929509][T27043] loop3: detected capacity change from 0 to 386 [ 2233.967394][T27043] Mount JFS Failure: -22 08:11:57 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f00000016c0), 0x400000, 0x0) 08:11:57 executing program 4: r0 = socket(0x1, 0x5, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2234.008102][T27043] jfs_mount failed w/return code = -22 08:11:57 executing program 1: socketpair(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 08:11:57 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) write$binfmt_script(r2, 0x0, 0x0) 08:11:57 executing program 5: select(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x6}, 0x0, &(0x7f0000000100)={0x77359400}) 08:11:57 executing program 4: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x22080, 0x0) [ 2234.059547][T27043] loop3: detected capacity change from 0 to 386 [ 2234.083039][T27043] Mount JFS Failure: -22 [ 2234.148801][T27043] jfs_mount failed w/return code = -22 08:11:57 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="02c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:57 executing program 4: socketpair(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendto$packet(r0, &(0x7f0000000000)="84", 0x1, 0x40, 0x0, 0x0) 08:11:57 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001600)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0, 0xfffffed9}}, {{&(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x0, &(0x7f0000001500)=[{&(0x7f0000001840)="2ed9c72ee488a8fc778e068217a6be4ad0fda8eee9838a30ba84ee395ced3a4619b4b85463fb7ee40fab9eb64d232ef1430d422b84f5444ac3a2a02ff9befd99237d443e0b569cb6d8876e2bbf79bc556bd0819769fa96e7422f470200000095fc2e7becc8ae5803d36ebaf30ab0f00ca6638b29e35535688e95415986b499462d4d116e46fe0eea346dfe9c337593c6a07fb36424c8957edbcee21a126a30f67a9fd7aa340df2f769c77770354a4633e549f1fad13b57626bcb71f87292fca983b4453c429b60a654240a996d68b7be1c4df6f52b7179"}, {&(0x7f0000000400)="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"}, {&(0x7f0000001400)="f927c3a841f112e4ef7719b1c9697223829ea4dcb8db1e578705a040e52654c70bd859536ad612e402f97d8ac75116c204bb6253a79208433066b2503cb2c9af8c6d7461c218155f96dc9e07f3e0eaedb192a577f1b508c4c22ab74b8dec1ff0e2d7d0bcd0"}, {&(0x7f0000001680)="3bb78fd27090875d26295251399ad07bbd53f6f67a613b8412cc3fa6e3faeb22d3e8261df9746edb855d065b39249a3e69a053c136bc63ff69b9dee0a3d9f1e9766f316adf4156e20c08f6c65baed0ffac240015a8eeccba6353da0cc111c208afd8dc296565fda668edd36571bad8e3f766026956a9e384b54ca004eb425a448f09d6f69f2c21eb6fde4c8bd8c87cec5aee932a0a"}, {&(0x7f00000014c0)}], 0x0, &(0x7f0000000340)=[@tclass, @pktinfo={{0x0, 0x29, 0x32, {@local}}}, @rthdr_2292={{0x0, 0x29, 0x39, {0x0, 0x0, 0x0, 0x0, 0x0, [@rand_addr=' \x01\x00', @private0, @private1]}}}]}}], 0x1, 0x0) 08:11:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000340)="cc", 0x1) 08:11:57 executing program 2: r0 = socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, 0x0, 0xffffffe9) 08:11:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x18, &(0x7f0000000240), 0x4) 08:11:57 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8, &(0x7f0000000040), 0x4) 08:11:57 executing program 4: socketpair(0x1, 0x2, 0x0, &(0x7f0000000400)) 08:11:57 executing program 2: socketpair(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$packet(r0, &(0x7f0000000000), 0x0, 0x20040041, 0x0, 0x0) 08:11:57 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 08:11:57 executing program 0: r0 = socket(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, 0x0, 0xfffffffffffffd43) 08:11:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet(r0, &(0x7f00000001c0), 0x0, 0x4000) [ 2234.464961][T27091] loop3: detected capacity change from 0 to 386 [ 2234.535764][T27091] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2234.535764][T27091] [ 2234.554509][T27091] ERROR: (device loop3): remounting filesystem as read-only [ 2234.563728][T27091] xtLookup: xtSearch returned -5 [ 2234.573629][T27091] read_mapping_page failed! [ 2234.616527][T27091] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2234.634024][T27091] Mount JFS Failure: -5 [ 2234.638315][T27091] jfs_mount failed w/return code = -5 [ 2234.719247][T27091] loop3: detected capacity change from 0 to 386 [ 2234.739911][T27091] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2234.739911][T27091] [ 2234.750674][T27091] ERROR: (device loop3): remounting filesystem as read-only [ 2234.757999][T27091] xtLookup: xtSearch returned -5 [ 2234.763579][T27091] read_mapping_page failed! [ 2234.768149][T27091] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2234.774599][T27091] Mount JFS Failure: -5 [ 2234.778789][T27091] jfs_mount failed w/return code = -5 08:11:58 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="03c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:58 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, 0x0, 0x0) 08:11:58 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001180), 0x2, 0x0) fgetxattr(r0, &(0x7f0000001200)=@known='trusted.overlay.redirect\x00', 0x0, 0x0) 08:11:58 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet(r0, &(0x7f0000000680)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) 08:11:58 executing program 1: r0 = socket(0x1, 0x5, 0x0) sendto$packet(r0, 0x0, 0x0, 0x4048010, 0x0, 0x0) 08:11:58 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_tcp_buf(r0, 0x6, 0x0, 0x0, 0x0) 08:11:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000140), 0x0) 08:11:58 executing program 4: socketpair(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x120) sendto$packet(r1, &(0x7f0000000040)="d4", 0x1, 0x0, 0x0, 0x0) 08:11:58 executing program 2: r0 = socket(0x1, 0x1, 0x0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000000)=@ccm_128={{}, "8e74d005d39e8e74", "5d8be569c686b17ad3f133783e0ac22e", "58a00e68", "f871b4a34f170bd7"}, 0x28) 08:11:58 executing program 1: r0 = socket(0x1, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) 08:11:58 executing program 5: r0 = memfd_create(&(0x7f0000000040)='o5\x98\xcb\xbdv\xe7rqI\x04\x00\x12\xae\xf5\xdchHJ=', 0x0) r1 = socket$inet6_icmp(0xa, 0x3, 0x3a) dup3(r0, r1, 0x0) write$P9_RCREATE(r1, 0x0, 0x0) 08:11:58 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x50) [ 2235.029989][T27117] loop3: detected capacity change from 0 to 386 [ 2235.100202][T27117] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2235.100202][T27117] [ 2235.140579][T27117] ERROR: (device loop3): remounting filesystem as read-only [ 2235.148146][T27117] xtLookup: xtSearch returned -5 [ 2235.153840][T27117] read_mapping_page failed! [ 2235.158616][T27117] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2235.165855][T27117] Mount JFS Failure: -5 [ 2235.170766][T27117] jfs_mount failed w/return code = -5 [ 2235.267540][T27117] loop3: detected capacity change from 0 to 386 [ 2235.283191][T27117] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2235.283191][T27117] [ 2235.310937][T27117] ERROR: (device loop3): remounting filesystem as read-only [ 2235.318387][T27117] xtLookup: xtSearch returned -5 [ 2235.325085][T27117] read_mapping_page failed! [ 2235.330134][T27117] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2235.336711][T27117] Mount JFS Failure: -5 [ 2235.341607][T27117] jfs_mount failed w/return code = -5 08:11:58 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="04c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:58 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0xa, 0x4e22, 0x0, @dev, 0xef16}, 0x1c, 0x0}, 0x0) 08:11:58 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f0000000400)) 08:11:58 executing program 4: r0 = socket$inet_icmp(0x2, 0x2, 0x1) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x10) 08:11:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000001000)=0x7f, 0x4) 08:11:58 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0xffffffffffffff5f) 08:11:58 executing program 4: io_setup(0x1, &(0x7f00000000c0)=0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 08:11:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000140)={'wlan0\x00', 0x0}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="f0020000", @ANYRES16=r4, @ANYBLOB="010400000000000000003b00000008000300", @ANYRES32=r3, @ANYBLOB="d202330080200100000000000000080211"], 0x2f0}}, 0x0) 08:11:58 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) r1 = dup(r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000180)={0x0, @in, 0x44, 0x0, 0x391}, 0x98) 08:11:58 executing program 1: semget(0x0, 0x2, 0x381) 08:11:58 executing program 2: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_SET(r0, 0x1, &(0x7f0000000040)={{0x2, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 08:11:58 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 2235.703448][T27159] loop3: detected capacity change from 0 to 386 [ 2235.737072][T27159] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2235.737072][T27159] [ 2235.760137][T27159] ERROR: (device loop3): remounting filesystem as read-only [ 2235.786399][T27159] xtLookup: xtSearch returned -5 [ 2235.805635][T27159] read_mapping_page failed! [ 2235.815765][T27159] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2235.826732][T27159] Mount JFS Failure: -5 [ 2235.832080][T27159] jfs_mount failed w/return code = -5 [ 2235.909328][T27159] loop3: detected capacity change from 0 to 386 [ 2235.919835][T27159] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2235.919835][T27159] [ 2235.945258][T27159] ERROR: (device loop3): remounting filesystem as read-only [ 2235.953494][T27159] xtLookup: xtSearch returned -5 [ 2235.958598][T27159] read_mapping_page failed! [ 2235.963479][T27159] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2235.970322][T27159] Mount JFS Failure: -5 [ 2235.974641][T27159] jfs_mount failed w/return code = -5 08:11:59 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="05c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:59 executing program 1: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc0a85320, &(0x7f0000000640)) tkill(r0, 0x7) 08:11:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x2c}}, 0x0) 08:11:59 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) connect$unix(r0, &(0x7f0000000300)=@abs, 0x6e) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) 08:11:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r2, r3, &(0x7f0000000340)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)}, 0x8) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4, 0x0, @fd=r5}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002f80)=@IORING_OP_WRITEV={0x2, 0x2, 0x0, @fd=r4, 0x0, 0x0}, 0x7) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 08:11:59 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0x83, &(0x7f0000000400)=@assoc_value, 0x8) 08:11:59 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000140), 0x40202, 0x0) write$binfmt_aout(r0, &(0x7f0000000a00)={{}, "22f83ed9661eb91eedb64cff6b540ceb27c9d02b18741a8912eb9d4d25571d577ae0339f7d11a192920161a8b77f9cd10e9513467e7092c67d0d"}, 0x5a) 08:11:59 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200020000100010005000000001c08107f13", 0x12, 0x400}, {&(0x7f0000010100)="ff000000feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff03f0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed415cf970000000e7c2645f5303", 0x80e, 0x800}, {0x0, 0x0, 0x1400}], 0x0, &(0x7f0000000300)=ANY=[]) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 08:11:59 executing program 4: openat$nvram(0xffffffffffffff9c, &(0x7f000000a2c0), 0x1a5c02, 0x0) [ 2236.151119][T27181] loop3: detected capacity change from 0 to 386 [ 2236.164279][T27181] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2236.164279][T27181] [ 2236.175523][T27181] ERROR: (device loop3): remounting filesystem as read-only [ 2236.198540][T27181] xtLookup: xtSearch returned -5 08:11:59 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000007c0)={0x2, &(0x7f0000000740)=[{0x800}, {}]}) 08:11:59 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000380), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 08:11:59 executing program 4: ioctl$SNAPSHOT_PREF_IMAGE_SIZE(0xffffffffffffffff, 0x3312, 0x0) [ 2236.257478][T27181] read_mapping_page failed! [ 2236.289484][T27181] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2236.296200][T27192] loop1: detected capacity change from 0 to 20 [ 2236.417567][T27181] Mount JFS Failure: -5 [ 2236.453475][T27192] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 2236.503427][T27181] jfs_mount failed w/return code = -5 08:11:59 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="06c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:11:59 executing program 1: syz_genetlink_get_family_id$netlbl_unlabel(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$netlbl_unlabel(0x0, 0xffffffffffffffff) 08:11:59 executing program 4: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001cc0)=[{&(0x7f0000001ac0)="af", 0x1}, {&(0x7f0000001bc0)="dc", 0x1}], 0x0, 0x0) 08:11:59 executing program 0: syz_open_dev$vbi(0x0, 0x0, 0x2) syz_mount_image$pvfs2(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 08:11:59 executing program 2: r0 = syz_mount_image$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='dyn']) openat(r0, &(0x7f0000001640)='./file0\x00', 0x0, 0x0) 08:12:00 executing program 0: syz_mount_image$pvfs2(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 08:12:00 executing program 1: pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000400)={0x10}, 0x0, 0x0) 08:12:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 08:12:00 executing program 5: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="0200000000003434180100007a4a7934d9d44b9a000000003f00000000000000000010000000000004000000000000001000000005000000010000000000000004000000000000000000000000000000e003000000000000561b675f00000000571b675f00000000571b675f000000000100320000000100561b675f00000000004eed0000000000000000000b00000080002000c0001000dadd32bf8764466dbb0c25de8a84ef61", 0xa8, 0x400}, {&(0x7f0000010100)="dd6bcb1c8fa443cb11faaf1e", 0xc, 0x1000}, {0x0, 0x0, 0x2080}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 2236.790278][T27217] loop3: detected capacity change from 0 to 386 08:12:00 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000240), 0x2, 0x2) ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f0000000280)={0x0, "ff662f2eae281c3c11d41a32cb6192011d0083984fc252213ef4119a44e265b1"}) [ 2236.860399][T27217] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2236.860399][T27217] [ 2236.881643][T27217] ERROR: (device loop3): remounting filesystem as read-only [ 2236.892781][T27217] xtLookup: xtSearch returned -5 [ 2236.903386][T27217] read_mapping_page failed! 08:12:00 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)="a41d", 0x2}}, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x990a72, 0x7, '\x00', @p_u16=&(0x7f0000000080)}}) fadvise64(r1, 0xffffffffffffffff, 0x0, 0x4) syz_open_procfs(0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) [ 2236.908363][T27217] jfs_mount: diMount(ipaimap) failed w/rc = -5 08:12:00 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4611, &(0x7f0000000140)={0x190, 0x48, 0x0, 0x0, 0x0, 0x0, 0x4}) [ 2236.973111][T27217] Mount JFS Failure: -5 [ 2237.002547][T27217] jfs_mount failed w/return code = -5 [ 2237.093399][T27217] loop3: detected capacity change from 0 to 386 [ 2237.129532][T27217] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2237.129532][T27217] [ 2237.149440][T27217] ERROR: (device loop3): remounting filesystem as read-only [ 2237.192494][T27217] xtLookup: xtSearch returned -5 [ 2237.197602][T27217] read_mapping_page failed! [ 2237.204578][T27217] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2237.213461][T27217] Mount JFS Failure: -5 [ 2237.217773][T27217] jfs_mount failed w/return code = -5 08:12:00 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="07c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:00 executing program 1: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$bt_hci(r1, 0x84, 0xd, &(0x7f0000001080)=""/4080, &(0x7f0000000080)=0xff0) 08:12:00 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f00000000c0)={0x0, 0x9}) 08:12:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x15, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x114, 0xa, 0x0, 0x4) 08:12:00 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000002a40)={0x0, 0x0, &(0x7f0000002a00)={&(0x7f0000000380)={0xec4, 0x0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0xeb0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xa8, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'l2tp\x00'}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fffffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'l2tp\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0xdfd, 0x4, "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"}]}]}, 0xec4}, 0x1, 0x0, 0x0, 0x11}, 0x24000880) 08:12:00 executing program 1: syz_mount_image$sysv(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000440), 0x808001, &(0x7f00000004c0)) 08:12:00 executing program 5: syz_genetlink_get_family_id$ieee802154(&(0x7f0000000000), 0xffffffffffffffff) socketpair(0x26, 0x0, 0x0, &(0x7f0000000500)) 08:12:00 executing program 2: set_mempolicy(0x1, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_rdma(&(0x7f0000000080), &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000200)) 08:12:00 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 08:12:00 executing program 0: socket(0x0, 0x0, 0x0) r0 = syz_usb_connect$printer(0x0, 0x36, &(0x7f0000000380)=ANY=[@ANYBLOB="1201000009000008250592d2070000000101090224ffff050074980904e4ff110701030009"], 0x0) syz_usb_control_io$printer(r0, 0x0, &(0x7f0000000280)={0x34, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x20, 0x0, 0xfffffffffffffe7a}}) syncfs(0xffffffffffffffff) syz_open_dev$char_usb(0xc, 0xb4, 0x0) 08:12:00 executing program 2: socket$packet(0x11, 0x2, 0x300) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x0, 0x7, 0x3}, 0x14}}, 0x0) 08:12:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000005d00)={&(0x7f0000005c00)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000005cc0)={&(0x7f0000005c40)={0x14}, 0x14}}, 0x0) [ 2237.592506][T27263] loop3: detected capacity change from 0 to 386 [ 2237.714955][T27263] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2237.714955][T27263] [ 2237.763309][T27263] ERROR: (device loop3): remounting filesystem as read-only [ 2237.774057][T27263] xtLookup: xtSearch returned -5 [ 2237.783046][T27263] read_mapping_page failed! [ 2237.793642][T27263] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2237.805940][T27263] Mount JFS Failure: -5 [ 2237.814639][T27263] jfs_mount failed w/return code = -5 [ 2237.859316][T27263] loop3: detected capacity change from 0 to 386 [ 2237.868323][T27263] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2237.868323][T27263] [ 2237.880639][T27263] ERROR: (device loop3): remounting filesystem as read-only [ 2237.887965][T27263] xtLookup: xtSearch returned -5 [ 2237.895714][T27263] read_mapping_page failed! [ 2237.901309][T27263] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2237.907602][T27263] Mount JFS Failure: -5 [ 2237.913700][T27263] jfs_mount failed w/return code = -5 08:12:01 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="08c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:01 executing program 1: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000180)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000640)) tkill(r0, 0x7) 08:12:01 executing program 5: syz_mount_image$pvfs2(&(0x7f0000001800), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002a40)) 08:12:01 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/241, 0xf1) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000180)={0x1d3}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000300)={0x0, 0x0, 'client1\x00', 0x0, "3f5ac29df43e8d7f", "f1520b1b5492c66dea258adfddf281cda740ad5f71139be35580778517d85eb6"}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) tkill(r0, 0x1004000000016) 08:12:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000900)='/proc/asound/card0/oss_mixer\x00', 0x0, 0x0) read(r1, &(0x7f0000000940)=""/4096, 0x1000) 08:12:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000004c0)={'batadv0\x00', @ifru_ivalue}) 08:12:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x84, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_FRAME={0x60, 0x33, @beacon={@with_ht={{{}, {}, @device_b, @device_b}}, 0x0, @random, 0x0, @val={0x0, 0x6, @default_ap_ssid}, @val, @val={0x3, 0x1}, @val={0x4, 0x6}, @val={0x6, 0x2}, @val={0x5, 0x3}, @val={0x25, 0x3}, @val={0x2a, 0x1}, @val={0x3c, 0x4}, @void, @void, @void, @val={0x76, 0x6}}}, @NL80211_ATTR_CSA_C_OFFSETS_TX={0x8, 0xcd, [0x0, 0x0]}]}, 0x84}}, 0x0) 08:12:01 executing program 4: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001cc0), 0x20) 08:12:01 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x16, 0x5, 0x0, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x40) 08:12:01 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x42000480, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB], &(0x7f0000000140)=""/161, 0x2a, 0xa1, 0x8}, 0x20) clone(0x400c0040, 0x0, 0x0, 0x0, 0x0) [ 2238.153180][T27290] loop3: detected capacity change from 0 to 386 08:12:01 executing program 4: syz_open_dev$vcsa(&(0x7f0000000040), 0x9, 0x0) [ 2238.216595][T27290] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2238.216595][T27290] 08:12:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x12081ff) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200), 0xf642e7e) r2 = creat(0x0, 0x0) fallocate(r2, 0x0, 0x0, 0x4003be) [ 2238.301386][T27290] ERROR: (device loop3): remounting filesystem as read-only [ 2238.349550][T27290] xtLookup: xtSearch returned -5 [ 2238.354816][T27290] read_mapping_page failed! [ 2238.385860][T27290] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2238.406652][T27290] Mount JFS Failure: -5 [ 2238.428820][T27290] jfs_mount failed w/return code = -5 [ 2238.488685][T27290] loop3: detected capacity change from 0 to 386 [ 2238.506546][T27290] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2238.506546][T27290] [ 2238.531208][T27290] ERROR: (device loop3): remounting filesystem as read-only [ 2238.538573][T27290] xtLookup: xtSearch returned -5 [ 2238.577021][T27290] read_mapping_page failed! [ 2238.602641][T27290] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2238.625606][T27290] Mount JFS Failure: -5 [ 2238.643836][T27290] jfs_mount failed w/return code = -5 08:12:02 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="09c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:02 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff}) fspick(r0, 0x0, 0x0) 08:12:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x44, 0x0, "374bfd36337da507e54f1a2e507d91b504794984b3d23315bebdad78fa07f1c4bff9b652bfb855ed59ad9cf22d725b6027c0d410caee19f4403ca81e3211b31f0d9eeb878fb28b573d8733395fd9ace1"}, 0xd8) setsockopt$inet_tcp_int(r0, 0x6, 0x20, &(0x7f0000000040)=0x2, 0xf6) 08:12:02 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x3, 0x0, 0xbe1}, 0x20) 08:12:02 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1d, 0x1d, 0x6, [@var, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], 'd'}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x3e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:12:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x15, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x114, 0x6, 0x400000, 0x4) 08:12:02 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001140)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) dup2(r1, r0) [ 2238.951625][T27325] loop3: detected capacity change from 0 to 386 08:12:02 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000040)) 08:12:02 executing program 4: pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000400)={0x10}, &(0x7f0000000440)={0x77359400}, &(0x7f00000004c0)={&(0x7f0000000480)={[0x86]}, 0x8}) 08:12:02 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) connect$unix(r0, 0x0, 0x0) 08:12:02 executing program 2: openat$vimc0(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) [ 2239.019904][T27325] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2239.019904][T27325] [ 2239.030574][T27325] ERROR: (device loop3): remounting filesystem as read-only [ 2239.038221][T27325] xtLookup: xtSearch returned -5 [ 2239.043791][T27325] read_mapping_page failed! [ 2239.048713][T27325] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2239.055636][T27325] Mount JFS Failure: -5 [ 2239.060662][T27325] jfs_mount failed w/return code = -5 08:12:02 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000d00)={{0x12, 0x1, 0x0, 0x84, 0x3d, 0xb7, 0x10, 0x553, 0x202, 0x3207, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xbe, 0x38, 0x5b}}]}}]}}, 0x0) syz_usbip_server_init(0x4) syz_usbip_server_init(0x5) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000001dc0)={0x2c, &(0x7f0000001c40), 0x0, 0x0, 0x0, 0x0}) [ 2239.172538][T27325] loop3: detected capacity change from 0 to 386 [ 2239.190056][T27325] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2239.190056][T27325] [ 2239.202364][T27325] ERROR: (device loop3): remounting filesystem as read-only [ 2239.211939][T27325] xtLookup: xtSearch returned -5 [ 2239.217203][T27325] read_mapping_page failed! [ 2239.222587][T27325] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2239.229595][T27325] Mount JFS Failure: -5 [ 2239.235117][T27325] jfs_mount failed w/return code = -5 08:12:02 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="0ac4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:02 executing program 5: semtimedop(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0) 08:12:02 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000640)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/368]}, 0x1e8) clone(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 08:12:02 executing program 0: syz_io_uring_setup(0x4ca4, &(0x7f0000002d40)={0x0, 0x50d3, 0x8}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, 0x0) 08:12:02 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000001000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) kcmp(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 08:12:02 executing program 0: openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340), 0x20102, 0x0) 08:12:02 executing program 1: syz_open_dev$vbi(&(0x7f0000000400), 0x0, 0x2) [ 2239.569333][T28872] usb 5-1: new high-speed USB device number 95 using dummy_hcd 08:12:02 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) [ 2239.616657][T27362] loop3: detected capacity change from 0 to 386 08:12:03 executing program 0: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) recvfrom$phonet(r0, 0x0, 0x0, 0x40010000, 0x0, 0x0) 08:12:03 executing program 2: mount$fuse(0x0, &(0x7f0000002100)='./file0\x00', &(0x7f0000002140), 0x0, &(0x7f0000002180)) 08:12:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/dev_snmp6\x00') lseek(r1, 0x285, 0x0) getdents64(r1, 0x0, 0x0) [ 2239.729228][T27362] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2239.729228][T27362] [ 2239.739619][T27362] ERROR: (device loop3): remounting filesystem as read-only [ 2239.747011][T27362] xtLookup: xtSearch returned -5 [ 2239.753309][T27362] read_mapping_page failed! [ 2239.758165][T27362] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2239.765146][T27362] Mount JFS Failure: -5 [ 2239.770064][T27362] jfs_mount failed w/return code = -5 [ 2239.839088][T28872] usb 5-1: Using ep0 maxpacket: 16 [ 2239.846944][T27362] loop3: detected capacity change from 0 to 386 [ 2239.865271][T27362] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2239.865271][T27362] [ 2239.900128][T27362] ERROR: (device loop3): remounting filesystem as read-only [ 2239.911292][T27362] xtLookup: xtSearch returned -5 [ 2239.951861][T27362] read_mapping_page failed! [ 2239.971088][T28872] usb 5-1: New USB device found, idVendor=0553, idProduct=0202, bcdDevice=32.07 [ 2239.979412][T27362] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2239.981462][T28872] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2239.997306][T28872] usb 5-1: config 0 descriptor?? [ 2240.009250][T27362] Mount JFS Failure: -5 [ 2240.013503][T27362] jfs_mount failed w/return code = -5 [ 2240.051548][T28872] gspca_main: stv0680-2.14.0 probing 0553:0202 08:12:03 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000340)={&(0x7f0000000180), 0xc, &(0x7f0000000300)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x130}}, 0x8) 08:12:03 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00'}) 08:12:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x78, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_FRAME={0x5a, 0x33, @beacon={@with_ht={{{}, {}, @broadcast, @device_b}}, 0x0, @random, 0x0, @val={0x0, 0x6, @default_ap_ssid}, @val={0x1, 0x2, [{0x60}, {0x0, 0x1}]}, @val={0x3, 0x1}, @val={0x4, 0x6}, @val={0x6, 0x2}, @val={0x5, 0x3}, @val={0x25, 0x3}, @val={0x2a, 0x1}, @val={0x3c, 0x4}, @void, @void, @void, @void}}]}, 0x78}}, 0x0) 08:12:03 executing program 2: r0 = syz_open_dev$cec(&(0x7f0000000480), 0x2, 0x2) ioctl$VIDIOC_QUERYBUF(r0, 0x805c6103, 0x0) 08:12:03 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="0bc4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:03 executing program 5: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc05c5340, &(0x7f0000000640)) tkill(r0, 0x7) 08:12:03 executing program 0: clone(0x180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x10, 0x0, 0x0, [{}]}]}}, &(0x7f0000000080)=""/259, 0x32, 0x103, 0x8}, 0x20) 08:12:03 executing program 2: syz_genetlink_get_family_id$nl80211(&(0x7f0000002940), 0xffffffffffffffff) 08:12:03 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000000340)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000740)={[{@grpquota}]}) syz_mount_image$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@dyn}]}) sendfile(r0, r1, 0x0, 0x800000080004103) 08:12:03 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) connect$unix(r0, &(0x7f0000000300)=@file={0x0, '.\x00'}, 0x6e) 08:12:03 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000003c0)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x1a}}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x5c}}, 0x0) [ 2240.398798][T27393] loop3: detected capacity change from 0 to 386 08:12:03 executing program 0: socketpair(0x2, 0xa, 0x0, &(0x7f0000000280)) [ 2240.469381][T27393] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2240.469381][T27393] [ 2240.481708][T27393] ERROR: (device loop3): remounting filesystem as read-only [ 2240.490202][T27393] xtLookup: xtSearch returned -5 [ 2240.496227][T27393] read_mapping_page failed! [ 2240.506739][T27393] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2240.517980][T27393] Mount JFS Failure: -5 [ 2240.522798][T27393] jfs_mount failed w/return code = -5 08:12:03 executing program 2: inotify_add_watch(0xffffffffffffffff, 0x0, 0x20000604) [ 2240.577134][T27393] loop3: detected capacity change from 0 to 386 [ 2240.619860][T27393] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2240.619860][T27393] 08:12:04 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000080e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(0x0, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) setxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r2, r1, 0x0, 0x401ffc000) r3 = creat(&(0x7f0000000300)='./file0/file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0), 0xd4ba0ff) pwritev(0xffffffffffffffff, &(0x7f00000008c0)=[{&(0x7f0000000540)="6b805da799f9f368931d0d515fbb3c649322621c2a62e2363e4ccd74bc3e16432d93c43e789238f237f9e508", 0x2c}, {&(0x7f0000000580)="8353aa74e0aed67b1a616131028946347e1a9e019075fab87ca54c814c652bf5881b4c7b9c11722263368efc67e45e73c5413fd99b1a146c5fbf8f16ee04a5920c622896f9246a25426c85065b8645e59d5ae4d4c5358122fde8285cd2e565a9758f9c8d5c63f45a736c785e541f8725d12bc2cbe0535d214cda84e93cf23c00ab76c6d8abdd8be2be919896e519011ae50224a9bbc9d0f7dce2d4266a41e38e702cbd13b788e6e3508927f486ce90a284bb88b8dc1f5bbf42cfd40d4d", 0xbd}, {0x0}, {&(0x7f00000007c0)="b0802f07eaf897524328c7aefdf4025fc18155d20541d2ff018c8829c06584009361c996726a27e1320595fd74ac842075da9c1e4134ebdab676ddf92105791d1d423a0cdf7beb6c623561ee590dded6061740b6d505817101946d990f8c5bd9880f46dc112e16df79be5764f555085d777a1f73c4e9dedc2d4887e6f99aa56a34b593cff8ea34128ec479863d2ee6af0a34", 0x92}], 0x4, 0x0, 0xff) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0), 0x6840, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="06000000", @ANYRES32=r3, @ANYBLOB="00000000000000004849feff0800000010"], &(0x7f0000000100)='GPL\x00', 0x0, 0x68, &(0x7f0000000140)=""/104, 0x40e00, 0x14, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000440)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000480)={0x0, 0x3, 0x2, 0x8}, 0x10}, 0x78) open_by_handle_at(r1, &(0x7f0000000280)=@nfs={0x90, 0x24, {0x2c, 0x0, 0x6, 0x80, "5936214d9d76f6bb9333e25ec07fc796f1f8b347ba994111016415ba9117f225cc590ce52a3a3518ce84316873fff1e06848b7f7d73ea51b3b490070348e09bcf8c32302eb3bacba97a722d6eb87e79cc00e694aa3007bb51919dc65310c91ff3ea047dc48d8f5a16fbb5700a40588b7404a8598955da9f467ecf07df24f06be"}}, 0x200000) 08:12:04 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) lseek(r1, 0x4200, 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) preadv(r0, &(0x7f0000000000)=[{&(0x7f00000002c0)=""/190, 0xbe}], 0x1, 0x7ff, 0x80000001) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) sendfile(r0, r0, 0x0, 0x8080ffffff7e) [ 2240.738308][T27393] ERROR: (device loop3): remounting filesystem as read-only [ 2240.791793][T27393] xtLookup: xtSearch returned -5 08:12:04 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x41, 0x41, 0x7, [@array, @func_proto, @var, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], 'd'}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x63}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2240.816052][T27393] read_mapping_page failed! [ 2240.866603][T27393] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2240.929964][T27393] Mount JFS Failure: -5 [ 2240.946163][T27393] jfs_mount failed w/return code = -5 08:12:04 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="0cc4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$phonet_pipe(0x23, 0x5, 0x2) dup3(r0, r2, 0x0) 08:12:04 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 08:12:04 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x7800) 08:12:04 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000480), 0x2, 0x2) ioctl$VIDIOC_QUERYBUF(r0, 0x4020940d, 0x0) 08:12:04 executing program 2: unshare(0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[], 0xbf) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) setxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000300)='./file0/file0\x00', 0x0) r3 = creat(&(0x7f0000000300)='./file0/file0\x00', 0x0) write$cgroup_type(r3, &(0x7f00000009c0), 0xd4ba0ff) pwritev(r3, &(0x7f00000008c0)=[{&(0x7f0000000540)="6b805da799f9f368931d0d515fbb3c649322621c2a62e2363e4ccd74bc3e16432d93c43e789238f237f9e508faf888b60d80", 0x32}, {&(0x7f0000000580)="8353aa74e0aed67b1a616131028946347e1a9e019075fab87ca54c814c652bf5881b4c7b9c11722263368efc67e45e73c5413fd99b1a146c5fbf8f16ee04a5920c622896f9246a25426c85065b8645e59d5ae4d4c5358122fde8285cd2e565a9758f9c8d5c63f45a736c785e541f8725d12bc2cbe0535d214cda84e93cf23c00ab76c6d8abdd8be2be919896e519011ae50224a9bbc9d0f7dce2d4266a41e38e702cbd13b788e6e3508927f486ce90a284bb88b8dc1f5bbf42cfd40d4d", 0xbd}, {0x0}, {&(0x7f0000000700)="19d0879d6af8a2f912dff7b3bb519d3ae4bb49e0e8a99de864306f1f56d27a05b28ec28e7563fdafae3849b30496b7a9efb350bc0be9c7e2d8206b32b2722249bbf17d039212d7428167f2c5c9730da4f9c78e0e6cb6b43ec688c1b151a90f521812451b33377854e36991ab0e3e2727120a908d5c1c81b3ddf756eb45fb0c2c1651ae5206f17a808086b1a4148afa250c128ff1f888f2da56622a6ad1", 0x9d}, {&(0x7f00000007c0)="b0802f07eaf897524328c7aefdf4025fc18155d20541d2ff018c8829c06584009361c996726a27e1320595fd74ac842075da9c1e4134ebdab676ddf92105791d1d423a0cdf7beb6c623561ee590dded6061740b6d505817101946d990f8c5bd9880f46dc112e16df79be5764f555085d777a1f73c4e9dedc2d4887e6f99aa56a34b593cff8ea34128ec479863d2ee6af0a34f350975be8b1e6484ee0f7ec8544badfbb114cef443967c5a8e26b8e038ec2b0c5b3ee52548619f0be23a616f60aec7a4faaac29", 0xc6}], 0x5, 0x0, 0xff) write$cgroup_type(r2, &(0x7f00000009c0), 0xd4ba0ff) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0), 0x6840, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="06000000", @ANYRES32=r2, @ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x68, &(0x7f0000000140)=""/104, 0x40e00, 0x14, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000440)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000480)={0x0, 0x3, 0x2, 0x8}, 0x10}, 0x78) ioctl$KVM_GET_EMULATED_CPUID(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000380)=""/174) open_by_handle_at(r1, &(0x7f0000000280)=@nfs={0x90, 0x24, {0x2c, 0x0, 0x6, 0x80, "5936214d9d76f6bb9333e25ec07fc796f1f8b347ba994111016415ba9117f225cc590ce52a3a3518ce84316873fff1e06848b7f7d73ea51b3b490070348e09bcf8c32302eb3bacba97a722d6eb87e79cc00e694aa3007bb51919dc65310c91ff3ea047dc48d8f5a16fbb5700a40588b7404a8598955da9f467ecf07df24f06be"}}, 0x200000) 08:12:04 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000040)={0x88, 0xfffffffffffffffe, 0x0, [{0x2, 0x9, 0x2, 0x5, './'}, {0x2, 0x5, 0x0, 0x7}, {0x0, 0x9d, 0x1, 0x8000, '%'}, {0x0, 0x1200000000000000, 0x1, 0x3ff, '&'}]}, 0x88) read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENT(r0, &(0x7f0000002140)={0x50, 0xffffffffffffffda, r1, [{0x6, 0x9, 0x5, 0x2, '#=,(-'}, {0x0, 0x5, 0x6, 0xffffffff, '.\xa0#)}:'}]}, 0x50) write$FUSE_BMAP(r0, &(0x7f00000021c0)={0x18, 0x0, 0x0, {0x998b}}, 0x18) syz_mount_image$fuse(&(0x7f0000002240), &(0x7f0000002280)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, &(0x7f00000022c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0x7fffffff}}, {@allow_other}, {}, {@max_read={'max_read', 0x3d, 0x5}}, {@allow_other}], [{@smackfshat={'smackfshat', 0x3d, '\'\\\''}}, {@obj_role={'obj_role', 0x3d, '&'}}, {@obj_type={'obj_type', 0x3d, '/dev/zero\x00'}}, {@fsmagic}, {@uid_gt={'uid>', r2}}, {@seclabel}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@appraise}]}}) syz_mount_image$pvfs2(&(0x7f0000002440), &(0x7f0000002480)='./file0\x00', 0x6, 0x2, &(0x7f0000002680)=[{&(0x7f00000024c0)="3e17161a258f19c015c459c5cbda771f1ff6ef8fd68e12e90a0aa66a8779d3a15bafe0c89399cdd31473c2d5d26f6be2dcebb906ee7ade7ddad617587bab465067cfb744facf56d79c1c3e7ba522bb7ad90f6d326a7e1226e7d29847e649f33037f7e627f4d858a95eeaeed35b3d81d1a0d15cd194786ededbf5b0f92de8f442a87beecb6dddf2303612bc91ffdf2f48b91353b677da5523691b9778ea03dc04f993da5b11cc7e98b8fddda6f3d661e3ec35c09d2875bd5f66667af02510d575550a3745d7ffd1d4d1fa04b62b233a7865980ac3b19070750fdc3de93402c21dab83d5a0264999bea1e61b66f63965d1", 0xf0, 0x200}, {&(0x7f00000025c0)="4dc7ff65ad4d71a0db58b5bb17155e685300416a6498ff29ac0c33626164eda10e3669be546d3a3c8220f2ef450b3840ba75d8503bb79d094391b9583b0f004eceed6990fe341f68627bd9d1e7475d1831224303fc180584f61cbd03de34cce5026d8b32e302fd63c463e0cadc60070494e440af1d9d616af5b823ae9c76454d2f8707f427d27d745999ceaf93766531eee123230fa1c2ba03e3aeea9c2693765e11f06ae0", 0xa5, 0x7}], 0x424a8, &(0x7f00000026c0)={[{'{:+'}, {'{&'}, {}, {'\'\\\''}, {'[#\x12[('}, {'user_id'}, {'$'}], [{@fsmagic={'fsmagic', 0x3d, 0x8}}]}) [ 2241.139333][T28872] gspca_stv0680: usb_control_msg error 0, request = 0x88, error = -71 [ 2241.160600][T28872] stv0680 5-1:0.0: STV(e): camera ping failed!! 08:12:04 executing program 4: socketpair(0x2a, 0x0, 0x0, &(0x7f0000000400)) 08:12:04 executing program 0: clock_gettime(0x5, &(0x7f00000003c0)) semctl$IPC_RMID(0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x4, 0xfffe}, {0x2, 0x9, 0x800}], 0x2, &(0x7f0000000040)={0x0, 0x3938700}) [ 2241.219361][T28872] gspca_stv0680: usb_control_msg error 0, request = 0x80, error = -71 08:12:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f00000005c0)=[{&(0x7f00000002c0)="4430b0b9268a52c6936538d6d3167479c90a5fd4b7f4aa7fb8381936ad993d31368c29f1aabbb52509807bb5e3ab3037f1ab90a211b7b3d7ecd0a46eb242174af68d350d54c9d64e8987e4cd68743ee5847ea7520095a3ceff1e6ebcfa202b80363f0485a9d4082cc05f8af242e25451702647260cb85a2ccb243150ccbee1651e50fdb3784ca73747baba09a86a5d4398ac8c53b48e4a0641fa7074141fa963adb0eb71f32537a65c7d0888da5d337a46cf6540df4919d3d21d64", 0xbb}, {&(0x7f0000000380)="caf1ff1837a8b32fa51990c7cff997052cfa3c09c9c155b828c21355a8450415b5d8437ef48e51c3b95a815630b00388aeb59ba5d56ae1097671f9cea6697f9f426916ed2d285d4bb37df2893204896a0d4b8e212747f22b63fb4c1131410c113360f6ced8d61b33f70253cea7a3df013525b4a44b724d56549ba26f00ea24d95feedc002098286ba4330712942a392815c5f37407eb55d93d41ed7710cc5f758159b3de342d058d", 0xa8}, {&(0x7f00000004c0)="be5d41699714538efa8b1f9a709344fb32fd181b999ef9e3a5b212cd1217ad057c2ae97bef368fdaf696438f9413", 0x2e}, {&(0x7f0000000200)="9ee9a774837a2d1cf43fa8d1f2732386c8ef4c4244e360b2678b86da40c229efb1bab7826fa1166a2bd86b164e63b2269303bdceca702c645233cd4e3a122415c74c45398b2d3052236a31ccd76cca5db0e9ef71db", 0x55}], 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 2241.290912][T28872] stv0680 5-1:0.0: last error: 0, command = 0x0 08:12:04 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_ifreq(r0, 0x8948, &(0x7f0000000000)={'netdevsim0\x00', @ifru_addrs=@qipcrtr}) [ 2241.375816][T28872] usb 5-1: USB disconnect, device number 95 [ 2241.385500][T27442] loop3: detected capacity change from 0 to 386 08:12:04 executing program 5: getsockopt$rose(0xffffffffffffffff, 0x104, 0x0, 0x0, 0x0) [ 2241.461638][T27442] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2241.461638][T27442] [ 2241.472974][T27442] ERROR: (device loop3): remounting filesystem as read-only [ 2241.481660][T27442] xtLookup: xtSearch returned -5 [ 2241.486633][T27442] read_mapping_page failed! [ 2241.491323][T27442] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2241.497636][T27442] Mount JFS Failure: -5 [ 2241.502537][T27442] jfs_mount failed w/return code = -5 [ 2241.578280][T27442] loop3: detected capacity change from 0 to 386 [ 2241.593824][T27442] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2241.593824][T27442] [ 2241.622320][T27442] ERROR: (device loop3): remounting filesystem as read-only [ 2241.637602][T27442] xtLookup: xtSearch returned -5 [ 2241.645773][T27442] read_mapping_page failed! [ 2241.650633][T27442] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2241.656932][T27442] Mount JFS Failure: -5 [ 2241.661401][T27442] jfs_mount failed w/return code = -5 08:12:05 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="0dc4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:05 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) 08:12:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x0) 08:12:05 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000140)={0x190, 0x48, 0x0, 0x190, 0x0, 0x0, 0x4}) 08:12:05 executing program 5: openat$nvram(0xffffffffffffff9c, &(0x7f00000009c0), 0x1, 0x0) 08:12:05 executing program 1: syz_open_dev$dri(&(0x7f0000000780), 0x1, 0x4000) 08:12:05 executing program 0: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x8) 08:12:05 executing program 1: syz_open_dev$hiddev(&(0x7f0000005b40), 0x0, 0x0) 08:12:05 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) connect$unix(r0, &(0x7f0000000300)=@file={0x0, '.\x00'}, 0x6e) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 08:12:05 executing program 4: r0 = socket$qrtr(0x2a, 0x2, 0x0) recvmmsg(r0, &(0x7f00000051c0)=[{{0x0, 0x0, &(0x7f0000000f40)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x0, 0x0) [ 2241.954715][T27475] loop3: detected capacity change from 0 to 386 08:12:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(r0, &(0x7f00000007c0)={0x2, 0x0, @loopback}, 0x10) [ 2242.053977][T27475] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2242.053977][T27475] 08:12:05 executing program 2: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00\b', 0x5, 0xc80}, {0x0}, {&(0x7f0000010e00)="513521150000000000100000000000000b000000000000000d0000001000000012000000000000000100000002000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000030000000b00000005000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f000001", 0xa9, 0x200000}, {&(0x7f0000010f00)="000000000000000000000000000000000000000000000000000000002c1b39b8", 0x20, 0x200fe0}, {&(0x7f0000011000)="000000000000000000000000000000000000000000000000000000060000000000020c600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000010000000510ec000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000002", 0xba, 0x2011e0}, {&(0x7f0000011100)="0000000000000003000000040078000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000005", 0x56, 0x2012e0}, {&(0x7f0000011200)='\x00\x00\x00\v', 0x4, 0x201380}, {&(0x7f0000011800)="0000000000000000000000000000000000000000000000000000000100000000513521150000000000100000000000000b000000000000000d0000001000000012000000000000000100000002000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000030000000b00000005000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f000001", 0xc9, 0x204fe0}, {&(0x7f0000011900)="000000000000000000000000000000000000000000000000000000002c1b39b8", 0x20, 0x205fe0}, {&(0x7f0000011a00)="513521152c1b39b8", 0x8, 0x3ff000}, {&(0x7f0000011b00)="0000000000000000fe", 0x9, 0x3ff040}, {&(0x7f0000012a00)="00000000000000000000010000000100000000020000000100000000030000000110", 0x22, 0xa00000}, {&(0x7f0000012c00)="ed4100205cf90100535f010003000000001000000000000002", 0x19, 0x1001000}, {&(0x7f0000012e00)="00000000000000000300000003", 0xd, 0x1001fe0}], 0x0, &(0x7f0000014500)) [ 2242.188046][T27475] ERROR: (device loop3): remounting filesystem as read-only [ 2242.230505][T27475] xtLookup: xtSearch returned -5 [ 2242.260246][T27475] read_mapping_page failed! [ 2242.270494][T27475] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2242.286436][T27475] Mount JFS Failure: -5 [ 2242.297723][T27475] jfs_mount failed w/return code = -5 [ 2242.371522][T27475] loop3: detected capacity change from 0 to 386 [ 2242.388756][T27475] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2242.388756][T27475] [ 2242.401113][T27475] ERROR: (device loop3): remounting filesystem as read-only [ 2242.408836][T27475] xtLookup: xtSearch returned -5 [ 2242.415641][T27475] read_mapping_page failed! [ 2242.421326][T27475] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2242.428311][T27475] Mount JFS Failure: -5 [ 2242.437833][T27475] jfs_mount failed w/return code = -5 08:12:05 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="0ec4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:05 executing program 4: socket(0x1d, 0x0, 0xfffffff7) 08:12:05 executing program 0: syz_genetlink_get_family_id$ethtool(&(0x7f0000001840), 0xffffffffffffffff) 08:12:05 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f0000000240)="440f20c0350e000000c4e37d1daea80000000f450fad8e0a800000f080450097b9800000c00f3235000800000f30480fc79d0400000066baf80cb818dfee86efc4e165fa3f66edc744240000000000c7442402030000006542c0a60e000000fe0f011c24d9b0fdfd21e8b98a03000f32", 0xffffffffffffff52}], 0x1, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:12:05 executing program 2: syz_mount_image$efs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f00000015c0)=[{0x0, 0x0, 0x13d}], 0x1000000, &(0x7f0000001680)={[{'P$&$*'}]}) 08:12:05 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) 08:12:05 executing program 2: openat$vnet(0xffffffffffffff9c, &(0x7f0000001240), 0x2, 0x0) 08:12:05 executing program 4: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000034c0), 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f00000020c0)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000003040)="0243443030310100004c0049004e005500580020002000320020002000200020002000f119fec820004300440052004f004d008240437e2b2443a9200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000002240)="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", 0x1a0, 0xe000}], 0x0, &(0x7f0000002000)={[{@map_acorn}, {@unhide}]}) statx(r0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, &(0x7f00000036c0)) 08:12:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ffe70a0000000010", @ANYRES32=r4, @ANYBLOB="00000000e60000001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000003c0)=@newqdisc={0x38, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000140)=@newtfilter={0x24, 0x66, 0xc37, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 08:12:06 executing program 0: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000050d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) preadv2(r0, &(0x7f0000000000)=[{&(0x7f0000000180)=""/4096, 0x4}], 0x1, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) [ 2242.742957][T27510] loop3: detected capacity change from 0 to 386 08:12:06 executing program 1: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736616e0ca00088020000400000004f8000020004000030000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011200)) [ 2242.853815][T27510] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2242.853815][T27510] [ 2242.871064][T27517] loop4: detected capacity change from 0 to 224 08:12:06 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$qrtr(r0, 0x0, 0x0) [ 2242.985606][T27510] ERROR: (device loop3): remounting filesystem as read-only [ 2243.032254][T27510] xtLookup: xtSearch returned -5 [ 2243.037830][T27526] loop1: detected capacity change from 0 to 256 [ 2243.048344][T27510] read_mapping_page failed! [ 2243.065723][T27526] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2243.065989][T27510] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2243.107210][T27510] Mount JFS Failure: -5 [ 2243.112168][T27510] jfs_mount failed w/return code = -5 [ 2243.143502][T27510] loop3: detected capacity change from 0 to 386 [ 2243.182031][T27510] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2243.182031][T27510] [ 2243.205819][T27510] ERROR: (device loop3): remounting filesystem as read-only [ 2243.213465][T27510] xtLookup: xtSearch returned -5 [ 2243.218484][T27510] read_mapping_page failed! [ 2243.224248][T27510] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2243.232174][T27510] Mount JFS Failure: -5 [ 2243.236402][T27510] jfs_mount failed w/return code = -5 08:12:06 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="11c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:06 executing program 5: openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x15400, 0x0) 08:12:06 executing program 0: unshare(0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000080eff95"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000100)=ANY=[], 0xbf) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) setxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, 0x0, 0x401ffc000) r4 = creat(&(0x7f0000000300)='./file0/file0\x00', 0x0) r5 = creat(&(0x7f0000000300)='./file0/file0\x00', 0x0) write$cgroup_type(r5, &(0x7f00000009c0), 0xd4ba0ff) pwritev(r5, &(0x7f00000008c0)=[{&(0x7f0000000540)="6b805da799f9f368931d0d515fbb3c649322621c2a62e2363e4ccd74bc3e16432d93c43e789238f237f9e508faf888b60d80", 0x32}, {&(0x7f0000000580)="8353aa74e0aed67b1a616131028946347e1a9e019075fab87ca54c814c652bf5881b4c7b9c11722263368efc67e45e73c5413fd99b1a146c5fbf8f16ee04a5920c622896f9246a25426c85065b8645e59d5ae4d4c5358122fde8285cd2e565a9758f9c8d5c63f45a736c785e541f8725d12bc2cbe0535d214cda84e93cf23c00ab76c6d8abdd8be2be919896e519011ae50224a9bbc9d0f7dce2d4266a41e38e702cbd13b788e6e3508927f486ce90a284bb88b8dc1f5bbf42cfd40d4d", 0xbd}, {&(0x7f0000000640)="84f0b0a077e111b97cbf3b916067e4796660345bfd7caa47cc786a203ede0f0673c7a53b76aac5d479ded74d1a56d4cc0377615574432e454742fc8e9f7b3062fc8a56684c06bfabf480ab018f8d473033a7eac2e17431d67d14aea9435e9e5edb94a9a1ab9447225dee336fe817701dcb4e3b5b4ba846e94f3435d234f195a83fcd9b186bb28c98bfcd1b2a007768870b02fd4b4b8a5ebcbc10388398466d52c433d0795f556231b995f350a910", 0xae}, {&(0x7f0000000700)="19d0879d6af8a2f912dff7b3bb519d3ae4bb49e0e8a99de864306f1f56d27a05b28ec28e7563fdafae3849b30496b7a9efb350bc0be9c7e2d8206b32b2722249bbf17d039212d7428167f2c5c9730da4f9c78e0e6cb6b43ec688c1b151a90f521812451b33377854e36991ab0e3e2727120a908d5c1c81b3ddf756eb45fb0c2c1651ae5206f17a808086b1a4148afa250c128ff1f888f2da56622a6ad1644bf5b8dc0a2968417c80718716bda95f9942fe8074638b", 0xb5}, {&(0x7f00000007c0)="b0802f07eaf897524328c7aefdf4025fc18155d20541d2ff018c8829c06584009361c996726a27e1320595fd74ac842075da9c1e4134ebdab676ddf92105791d1d423a0cdf7beb6c623561ee590dded6061740b6d505817101946d990f8c5bd9880f46dc112e16df79be5764f555085d777a1f73c4e9dedc2d4887e6f99aa56a34b593cff8ea34128ec479863d2ee6af0a34f350975be8b1e6484ee0f7ec8544badfbb114cef443967c5a8e26b8e038ec2b0c5b3ee52548619f0be23a616f60aec7a4faaac2924", 0xc7}], 0x5, 0x0, 0xff) write$cgroup_type(r4, &(0x7f00000009c0), 0xd4ba0ff) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0), 0x6840, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="06000000", @ANYRES32=r4, @ANYBLOB="00000000000000004849feff080000001032f0ff00000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x68, &(0x7f0000000140)=""/104, 0x40e00, 0x14, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000440)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000480)={0x0, 0x3, 0x2, 0x8}, 0x10}, 0x78) ioctl$KVM_GET_EMULATED_CPUID(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000380)=""/174) open_by_handle_at(r2, &(0x7f0000000280)=@nfs={0x90, 0x24, {0x2c, 0x0, 0x6, 0x80, "5936214d9d76f6bb9333e25ec07fc796f1f8b347ba994111016415ba9117f225cc590ce52a3a3518ce84316873fff1e06848b7f7d73ea51b3b490070348e09bcf8c32302eb3bacba97a722d6eb87e79cc00e694aa3007bb51919dc65310c91ff3ea047dc48d8f5a16fbb5700a40588b7404a8598955da9f467ecf07df24f06be"}}, 0x200000) 08:12:06 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x40) 08:12:06 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000001500), 0x4) 08:12:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}}, 0x0) 08:12:06 executing program 4: io_pgetevents(0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={0x77359400}, &(0x7f0000000940)={&(0x7f0000000900)={[0xa9ce]}, 0x8}) 08:12:06 executing program 1: write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$pvfs2(0x0, 0x0, 0x0, 0x2, &(0x7f0000002680)=[{&(0x7f00000024c0)='>', 0x1, 0x200}, {&(0x7f00000025c0)='M', 0x1}], 0x0, 0x0) 08:12:06 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x57}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:12:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400009) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x7a05, 0x1700) 08:12:06 executing program 4: r0 = socket(0x11, 0x3, 0x0) recvfrom$phonet(r0, 0x0, 0x0, 0x40000040, 0x0, 0x0) [ 2243.611212][T27550] loop3: detected capacity change from 0 to 386 08:12:07 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 2243.725612][T27550] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2243.725612][T27550] [ 2243.762038][T27558] loop1: detected capacity change from 0 to 2 [ 2243.793873][T27550] ERROR: (device loop3): remounting filesystem as read-only [ 2243.804235][T27550] xtLookup: xtSearch returned -5 [ 2243.809955][T27550] read_mapping_page failed! [ 2243.822985][T27550] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2243.831950][T27550] Mount JFS Failure: -5 [ 2243.836256][T27550] jfs_mount failed w/return code = -5 [ 2243.913749][T27550] loop3: detected capacity change from 0 to 386 [ 2243.930134][T27550] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2243.930134][T27550] [ 2243.930180][T27550] ERROR: (device loop3): remounting filesystem as read-only [ 2243.930195][T27550] xtLookup: xtSearch returned -5 [ 2243.930209][T27550] read_mapping_page failed! [ 2243.930239][T27550] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2243.963636][T27550] Mount JFS Failure: -5 [ 2243.967855][T27550] jfs_mount failed w/return code = -5 08:12:07 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="12c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:07 executing program 5: syz_open_dev$media(&(0x7f00000001c0), 0x0, 0x201) 08:12:07 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffff, 0x4}, 0x6) r1 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000040)) r2 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vcan0\x00'}) bind$can_j1939(r2, &(0x7f0000000240), 0x18) sendmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0), 0x18, &(0x7f0000000640)={0x0}}, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)) write$binfmt_misc(r0, 0x0, 0x9) 08:12:07 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$FUSE_BMAP(r0, 0x0, 0x0) 08:12:07 executing program 0: syz_open_dev$vcsa(&(0x7f0000000040), 0x9, 0x40082) 08:12:07 executing program 2: syz_io_uring_setup(0x13c8, &(0x7f0000000280)={0x0, 0x0, 0x2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000340), &(0x7f0000000380)) 08:12:07 executing program 2: perf_event_open(&(0x7f0000001600)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:12:07 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 08:12:07 executing program 0: syz_mount_image$pvfs2(0x0, 0x0, 0x0, 0x1, &(0x7f0000002680)=[{&(0x7f00000025c0)='M', 0x1}], 0x0, 0x0) 08:12:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x15, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x114, 0x1d, 0x0, 0x4) [ 2244.295719][T27589] loop3: detected capacity change from 0 to 386 08:12:07 executing program 2: syz_open_dev$cec(&(0x7f0000000780), 0x2, 0x2) syz_open_dev$cec(&(0x7f0000000780), 0x2, 0x2) 08:12:07 executing program 1: r0 = socket(0x11, 0x3, 0x0) accept$phonet_pipe(r0, 0x0, 0x0) [ 2244.403230][T27589] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2244.403230][T27589] [ 2244.502917][T27589] ERROR: (device loop3): remounting filesystem as read-only [ 2244.542190][T27589] xtLookup: xtSearch returned -5 [ 2244.580411][T27589] read_mapping_page failed! [ 2244.605049][T27589] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2244.634817][T27589] Mount JFS Failure: -5 [ 2244.652038][T27589] jfs_mount failed w/return code = -5 [ 2244.821698][T27589] loop3: detected capacity change from 0 to 386 [ 2244.834675][T27589] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2244.834675][T27589] [ 2244.861616][T27589] ERROR: (device loop3): remounting filesystem as read-only [ 2244.883890][T27589] xtLookup: xtSearch returned -5 [ 2244.903090][T27589] read_mapping_page failed! [ 2244.931678][T27589] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2244.946905][T27589] Mount JFS Failure: -5 [ 2244.951565][T27589] jfs_mount failed w/return code = -5 08:12:08 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="2fc4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:08 executing program 4: timer_create(0x0, &(0x7f0000000440)={0x0, 0x12}, &(0x7f0000000180)) r0 = syz_open_dev$usbmon(&(0x7f0000000040), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f0000000080)={0x0, 0x0}) r1 = getpid() ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000000c0)={0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x800000015) 08:12:08 executing program 0: openat$drirender128(0xffffffffffffff9c, &(0x7f0000002440), 0x9909a32251226bb0, 0x0) 08:12:08 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) 08:12:08 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x700, 0x0) 08:12:08 executing program 5: perf_event_open(&(0x7f0000000f40)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:12:08 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000100)='cpu.stat\x00', 0x700, 0x0) 08:12:08 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x1, 0x6, 0x5602, 0x101, 0x0, 0x1}, 0x40) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000240)={&(0x7f0000000000)="af6f8f6e4dd462c304c76195db3051aa17d8cc7583d440f114d9229ed68a2fd862403878924a84d61c3f160b2c6a44b98e51e62d5bb8b7f9610d4000b3c53f9d423cec315aedb3065acc0f85b9404e0e047f675f6c0cde67d938612637bf2069ba929e604c494d2a252f141aaddffbfba8e32d993da4682ab544ea621a1a4e70651a076caade71b916d65a53c161973212695c921d63dfadee7e1840d8478a97dcd990144282d7a380d3526d99bb54a47bf8ae24900e9fd6b14f2ecfac3b1a7d09f91e711489f93a1f9399b6ecb25e048908c4", &(0x7f00000001c0)=""/61, &(0x7f0000000140)="a62afd236ec711ddff5134054d1651058c1aae4241d8a45441d7324b0339c7bcd34b5b662e5bfad13ce88192a5fac7dd766e01e56c65084de928c5ef607304cafbcedb5aa410c9cfe3fd1504c6b44c7ae407f2d179140fe17d", &(0x7f0000000280)="646ed2b6a7cb1551885b7a488d69219a302fe1713b1d238bdc22f90f565d20fb13c2c19481e79f398903aa977e25a8d5564fd537bdff1e9f173ce00a2aba145ae91d12d508b1c7ce2e4ebeed4df58544db6073cf5fc0494a54f4951030deea97017b4d8151eb59b7b2555100b055bbc31fec378e54f67fc3b81d2e2a7082a769179575dd65b366ea45a796d32313bbe1bed4c9e12ad644e4371c97f51b", 0x3, r0, 0x4}, 0x38) 08:12:08 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8943, &(0x7f0000000000)={'veth1_virt_wifi\x00', @remote}) 08:12:08 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x17, 0x0, 0x8, 0x770, 0x0, 0x1}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f00000006c0), 0x0}, 0x20) [ 2245.588715][T27621] loop3: detected capacity change from 0 to 386 08:12:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[{0x18, 0x1, 0x1, '*'}], 0x18}, 0x0) [ 2245.728401][T27621] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2245.728401][T27621] [ 2245.816193][T27621] ERROR: (device loop3): remounting filesystem as read-only [ 2245.831896][T27621] xtLookup: xtSearch returned -5 [ 2245.846785][T27621] read_mapping_page failed! 08:12:09 executing program 4: socketpair(0x10, 0x2, 0xd, &(0x7f0000000080)) [ 2245.864607][T27621] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2245.895785][T27621] Mount JFS Failure: -5 [ 2245.915891][T27621] jfs_mount failed w/return code = -5 [ 2246.001229][T27621] loop3: detected capacity change from 0 to 386 [ 2246.016598][T27621] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2246.016598][T27621] [ 2246.036410][T27621] ERROR: (device loop3): remounting filesystem as read-only [ 2246.061433][T27621] xtLookup: xtSearch returned -5 [ 2246.066640][T27621] read_mapping_page failed! [ 2246.104376][T27621] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2246.122309][T27621] Mount JFS Failure: -5 [ 2246.126529][T27621] jfs_mount failed w/return code = -5 08:12:09 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="31c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001980)={0x9, 0x5, &(0x7f0000000180)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @func]}, &(0x7f0000001300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:12:09 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f000000bdc0)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f000000c1c0)={0x0, 0x0, &(0x7f000000c0c0)=[{0x0, 0x7ffff000}, {&(0x7f000000bf00)="c6", 0x1}], 0x2}, 0x0) 08:12:09 executing program 1: r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x5421, 0xffffffffffffffff) 08:12:09 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x1, 0x6, 0xc001, 0x101, 0x14, 0x1}, 0x40) 08:12:09 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x4, &(0x7f0000000380)=@framed={{}, [@alu={0x7, 0x0, 0xa}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:12:09 executing program 2: perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x700}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:12:09 executing program 1: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1100000000000000, &(0x7f0000000180)={0x1d, 0x4, 0x2, 0x0, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:12:09 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x1, 0x400, 0x1, 0x9}, 0x40) close(r0) 08:12:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001200)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@fwd={0x0, 0x0, 0x0, 0x7, 0xc}]}}, &(0x7f0000000200)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 2246.412736][T27657] loop3: detected capacity change from 0 to 386 08:12:09 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001bc0)={0x13, 0x8, 0x4}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@map=r0, 0xffffffffffffffff, 0x5}, 0x10) 08:12:09 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x4, &(0x7f0000000240)=@framed={{}, [@call]}, &(0x7f0000000040)='GPL\x00', 0x6, 0x8a, &(0x7f0000000080)=""/138, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 2246.609985][T27657] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2246.609985][T27657] [ 2246.643126][T27657] ERROR: (device loop3): remounting filesystem as read-only [ 2246.679780][T27657] xtLookup: xtSearch returned -5 [ 2246.684785][T27657] read_mapping_page failed! [ 2246.699565][T27657] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2246.705993][T27657] Mount JFS Failure: -5 [ 2246.739432][T27657] jfs_mount failed w/return code = -5 [ 2246.823387][T27657] loop3: detected capacity change from 0 to 386 [ 2246.842346][T27657] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2246.842346][T27657] [ 2246.879533][T27657] ERROR: (device loop3): remounting filesystem as read-only [ 2246.886883][T27657] xtLookup: xtSearch returned -5 [ 2246.945899][T27657] read_mapping_page failed! [ 2246.953260][T27657] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2246.962927][T27657] Mount JFS Failure: -5 [ 2246.967416][T27657] jfs_mount failed w/return code = -5 08:12:10 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="36c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:10 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000440)={&(0x7f0000000100)=@nameseq={0x1e, 0x0}, 0x10, 0x0}, 0x0) 08:12:10 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xf, 0x4, 0x0, 0xff, 0x0, 0x1}, 0x40) 08:12:10 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x5452, 0x400000) 08:12:10 executing program 0: bpf$BPF_PROG_TEST_RUN(0x1a, &(0x7f0000001600)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)}, 0x48) 08:12:10 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) sendmsg$inet(r0, &(0x7f0000001d00)={0x0, 0x0, 0x0}, 0x400c840) 08:12:10 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x100, 0x8, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40) 08:12:10 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000033c0)={0x0, 0x0, &(0x7f0000003300)=[{0x0}, {0x0}, {&(0x7f0000002fc0)="b3", 0x1}], 0x3}, 0x0) 08:12:10 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002540)={0x18, 0x4, &(0x7f0000002380)=@framed={{}, [@generic={0x18, 0x0, 0x4, 0x0, 0x72}]}, &(0x7f00000023c0)='syzkaller\x00', 0x6, 0xb9, &(0x7f0000002400)=""/185, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:12:10 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x12, 0x100, 0x8, 0x2, 0x0, 0x1}, 0x40) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000100)}, 0x20) 08:12:10 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000440)={0x5, 0x0, 0x0, 0x0, 0x4}, 0x40) [ 2247.291054][T27689] loop3: detected capacity change from 0 to 386 08:12:10 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000004c80)={0x0, 0x0, &(0x7f0000003c40)=[{0x0}, {&(0x7f0000003b40)=""/198, 0xc6}], 0x2}, 0x0) sendmsg$inet(r0, &(0x7f0000004dc0)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000080)="808464ca3b11d39e9a1a9fc6de1fc16b9fef753209f86e949205d2f690f2f58b6f0fb378eb9a6beb8f41ba", 0x2b}, {&(0x7f0000000780)="7669d62b764ec905930ce76e34e656fa6eb39930bb03912f5a0548e46448b64cc7e8fe33ac8f68752e044b50c58c49d7d25ac2e00d4e8eb9a5e585709ce359d9766a2c88e2e5ae0e93a9ce251fea2e82aa72c2dd52025e36fe3e66682bf7809931ea76c760ae37b051a15adc792b844136867853f4e1eebbfd4ad694a090e0d73a1713170f96521197a3100c4ab681958167d362d3d79aa4b7f17168", 0x9c}], 0x2, &(0x7f0000001840)=ANY=[], 0xf8}, 0x0) [ 2247.468768][T27689] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2247.468768][T27689] [ 2247.523013][T27689] ERROR: (device loop3): remounting filesystem as read-only [ 2247.539099][T27689] xtLookup: xtSearch returned -5 [ 2247.544814][T27689] read_mapping_page failed! [ 2247.553385][T27689] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2247.561294][T27689] Mount JFS Failure: -5 [ 2247.566356][T27689] jfs_mount failed w/return code = -5 [ 2247.633463][T27689] loop3: detected capacity change from 0 to 386 [ 2247.661408][T27689] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2247.661408][T27689] [ 2247.694567][T27689] ERROR: (device loop3): remounting filesystem as read-only [ 2247.738490][T27689] xtLookup: xtSearch returned -5 [ 2247.756596][T27689] read_mapping_page failed! [ 2247.781362][T27689] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2247.807711][T27689] Mount JFS Failure: -5 [ 2247.824999][T27689] jfs_mount failed w/return code = -5 08:12:11 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="3cc4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:11 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000400)={&(0x7f0000000040)=@name={0x1e, 0x2, 0x0, {{0x1}}}, 0x10, 0x0}, 0x0) 08:12:11 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) close(r1) 08:12:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x1a, &(0x7f0000000180), 0x4) 08:12:11 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8946, &(0x7f0000000000)={'veth1_virt_wifi\x00', @remote}) 08:12:11 executing program 0: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x21}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000340)={&(0x7f00000000c0), 0x0, &(0x7f0000000180)="8c87c198af9e33f1403f2281101119e40b37662359dc4f31f316b5067541992fc146f58569ab069a4b0cf0adb82c0bf6d203f09ff5e76f8ac0dd67e0ad1a3317e8fd8728c37d5afefb344fd65577478ae166e79c8a35136606110a1791b1a9d347aa9eac59f03199e8185e31ac90", &(0x7f0000000280)}, 0x38) mkdir(&(0x7f0000000380)='./file0\x00', 0x140) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000005c0)={0x0, &(0x7f0000000400)=""/145, &(0x7f00000004c0), &(0x7f0000000500)}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f00000008c0)={'team0\x00'}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000017700)={0x0, 0x0, 0x0}, 0x41) 08:12:11 executing program 0: r0 = gettid() perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0x0, 0xffffffffffffffff, 0x0) 08:12:11 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x17, 0x0, 0x400000, 0x770, 0x0, 0x1}, 0x40) 08:12:11 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000200)={&(0x7f0000000080)=@id, 0xf, 0x0}, 0x0) 08:12:11 executing program 1: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000001b7c0)=@bpf_lsm={0x2, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000018c0)={r0, 0x700, 0x0}, 0x10) [ 2248.133537][T27720] loop3: detected capacity change from 0 to 386 [ 2248.318550][T27720] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2248.318550][T27720] 08:12:11 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000100)="1a", 0x1}, {&(0x7f0000000200)="ee", 0x1}, {&(0x7f0000000300)="03", 0x1}], 0x3}, 0x4000050) 08:12:11 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x1010, 0x0, 0x0, "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"}, {0x78, 0x0, 0x0, "6a0397b2a70711bd05a6acb0d39057a527121d599e104a54f60bc4bcd6fd09a171b0c6f1b86cb841b4db1961df88b8961d8218e27e3440b2f5c425c1e2a4a0c02e103485f93932f6e95a90ec561f87b6df510588e77fa5610d59aa9725d0c68388"}, {0xc8, 0x0, 0x0, "8b6fac102540f9d6231cdaf501d2a7e4a8ee237f1c54d1400d85eaa8d8e65139f187c902e2a51e05745f241761272e6c8f20a482c21afaa073e8fdfa54ad9b6fda21570a2dcf3503286ace7da00aae52b98acbb9b006a6e0b9b9f2a38650bf6aef5a40e3edb70e6e3265fa72ea3cbdbd6e1811530ed15ec9176efe903474f2ad81acb903668fe24d07ac38b2ba3e7dbb94e80bfbb16ca637f831329ce5f2a44a08b0b40ec250d9bda445a38354acf3d975"}, {0xb8, 0x0, 0x0, "4b76577a834d7089e12bef2299f6079ba74146108314aaf3537c171abff56b4bc6925e4849cbe3eba4df4b4d7251f9f2895861d6427c872a0506826b06c4e903c2d4bba7d85a615a27c7e55c247df163754eefb2df628d80f6f266089715a7229916f8d5c4db6bf7dd787d955a7ef0b43198e5aeb942db2f5a290e2da79ee3e8dd6b829ad188df5bd6e8af90f54a77da69c51960663cddefe83a089fdc1f66e94a"}, {0x98, 0x0, 0x0, "54b39e731a2eba2fd3dbabca7ed9fdbbbd7ee95c8478923922d0fb6ced7e26fe0c2b2e18e73cafd5614610536ce05ebfc1b56387c8ea30604d3f16fb3cf78ce2c14b7d893f973d8942916bf0ee984ecc1cb62d5f4c2d40413f524253eae320695a3e37530b6cbdbeb1bf41799407f17221308ead280f71393c97c979c0d316b75b"}, {0xd68, 0x0, 0x0, "e9b97b698fa584a317cdc0fcd0adc099d2c548490b274bdf349e9dd8590bc555d6a748fde5a6627426a6ba8dd9cce47cbb9895f2eca07dd7b1af8b44d881a188b76c649993e1b742a9b48eb4f88e7f023c491d5943e68751e24d9523fa7c9f1c50880c76611ee9be5d247ad12038912e23ed0fbe7528aaccd64bc4372bce7ac476db7da055c04cbfa332ffc32ca5076a4bdd236b1f9e7333ad0acef6c19a1a96d82e823946b672b2fecb158df4768fb1794b811d38cf90101a0631ba818cb6f6d11c8c6077f7a5acbba88bdedb2b550b3b35c7806d1d8c0a58ad51d3875fd6cdeb06f73bb99a4f0bc55ef8f333d285ac07093b895e94b6a8316dca655fb27760bf0b41b9771f545bf02c018dcba4997cd151fa32512b8b3a74c41e3ba51b2417135512b8d2ec523b02cd94a574014c0c655abcf3f03822798fe59c26d9a05f42c5046478dd917fc8242301843661d9025efae9ecc499e83aaeaf7878b7ba633aa914a37eb46bad6dad06cb878770ca8ece30eb99f658104fc6f53a21f4ba4e8a03e8c97bb653a0286131c9b4ec5c665f72301e59cfb0e95aec4ad0e3ab09108a041c6602c7f58723c3a25545d02a5f33f63f6a5f292ef17b51daeb7b773ef28e9cb8a555f6c49856ebaa5919e30c110baa708fa68f32267987677209b8d9e6138a24914bf90057afdb531a3e51ae5de2f81a1fde776870b151d5b164d4929246626b9104748ef503e74868075deb9539ac3d958150b4a896ec5c1df0261a71b633feb04760916ccb8db618091ec5847e564ba91d258faa04fb434729ad65746e3cf407e40262715e11585f5df9ef57bbd06fb832f37bdd66262f9bf92ad9bec2bcda637891493c00076eac4826785335fff25dafa6ff4be20b4bdf24924cc5a136172dd04059cc36f6818314eed8360a2299dab51b332a52d7ed75a2358de51eccd7c9b23a87f3930f7bffc9722b0b4cd32276aae94f47697058c650c17046b0bc02b6cb7e13ed4e9fccac0bb4086c157cac761b7da1916fa2afe184e75ed187e72710e567dbf2caab872b9eafc04431f1ad90b1e96c3304baa94adbd86b4436107b536595ea1b6f7d6763a5da63430b92e389c9d3049f100a1902ea9413e26655399e0d78f661633e783bf81b7c25acebfa7f1e65ec9cc478de8a9f68f59270854d8662b8749b7063f3377bfb32127b77777e6679b80aa3cbdcbebf10715017c61229305148d6ce9227bd679dc3568f13b70cb5a31d83b0c526aa51644a8f678b12aa2f9bf93b4dafa0f15326df592bfbf20a1e0862d25c1c92a75cb44e1bfb0e8611b8469afb4f76d972ac040f904418b5c38e4b22c2a14287f4b683d566b56077a12a1597bcf46f3be04dc08bfe14e0a79cad238e63b344daeda0c5039270fd45272c6e1ec9f3a16c64cee14ebe43b70581e0955036df157c6ad7a7bf4a494e57b057a6718ff6a70fef1a05389f3a767bdb7d9487656d4968e3dbe4ccf2e0c33738808e6c5a8aba6433e6f7a51e8cd7e5e02d3f9f6fe8cbb181f3d1018fafd07d46791fbd9b7718921cdc4dc6d78b8aa42cfecb2825ec4614580b0d8d7875e7097cf2f56ebcf2eb34e31baaa5abfd545c9379e4fadec32baf17e3820e7a898ec4fe6c4610e81167dd2fc917e8c8e6b23430d0bf46fe3691f6c99eb99a4d951f03d60d807ac1e4b57cefa14c0b09eb6bc7b905342400227e11d29c85c2d14c1f7c2e55d78723c910efd01a2ed70a66a8be26482a6079c7404f60729a852c352c0d77dc06f0c55935c7eedb78fc0db509d8fb435f9970a1e0170e9a5cc76d8a1b81b7bb6889e4465a1445dc02b30c1e6bc50299a6edda004f6d5fb18a4be85b3d2c46599081d60539f67397e450e26e8d3a53b62120dbfd3a9ce91b44c82d05b4e7ca4709316a1a6ff74f30b41633815d602e30e652c25521626ef54891fde807dd09c2e8e698a254a9ba326f51990a5970d34ff6957ec70ced1f772f8c0c0136f2690c6f455e1d3b67a8325fa7bb65830ee36459e3d461eff17c97beaa584d333996e8445ab66129c971c4d1cc16c50d9d694fc68b1d8cc0743bff139c23cffe94f70b4d0bf393493b797060dc52e5042c31d2735b38e8efbb413464be3f967853eec24165ae296732a28651f3b02827372c803fd94de1ecdc23a22994f81c3c1b9141dd5be8e77a52c312a9ed0b8540de1002de2a2b26cd4fcbc9b269696d960df0173063e24a3b2fbb203d8960c902d9d96ae8f3351adf2696399b77c1e0b4b466c2d5ea137c699f6aca69030ce50b35c8609840107f97dacef7f0ff5f82d80db8d4a176496965107c732ee7cc7364e35b9d494e53e10b37859eff61315d4292f061bb511f392b3fd4161d4e19e3e61620a9acdf2e29cebd5b7a34ef578ce2c9870222f55becf40bceca5e9635e3f2603761116a47fc7681d57f524941fdce898f5ebe837e08c1a490e5a4be9a782b920edc052ccf1f43611ffb7fda65e0aa029978e25b6c9fc51f84591d2da4f1caa823ae083f9c401f31d05b209f89cf2bfe44acfb00bd025ddb7e70ae327f64e3f620c665de7d67f94dee49d47b392b026f34e78a01f43b169e69faa1bccf112bbc551b78a92b23999ca256a56abe8dd77ab6e05bad4d6ae1cd020f36a82ccab9aff7c65b468cf3937739c792d68d2766c2f131e97c866b94dcb7d1abfd1dcb47dba65ec27b7699d7c5c107bf1742099fab3deb1f1f548dd87ece69efe2d0be9795491182964e5ad5145a18df4a54cecbb05d29da16f99e201eee0f906870b5ec10f96e55e44b7c4e6201165c5b7f3dc0fc222048a90d9ca630b444d0ec539b6da1d986f43d4a8af6e01cbf72b1bfd06b959e7d22634a0a86eb947ea33a40e8ef8d67f25bb7bd5b9142b74303767bd82a61916709bea0c60991f5a1283664976d954d0b38188c7e7699db910cd2027df8db016ed15972c7a372bd4f2527603e573341a742c2eae4f658d2ceb9e05347641a7e978027d293553c22f44a5692e6c403fbf5b9a88e394705702ba32ec469e54bf0d521442d0645578ae3b49e5cce0676c4d05b14a353ba5fa6693a146bb3d838f3d7c1a4c6b2c992e5fe9020e045e3791525df543933b36eb869e0b1c38473fe571efc9513b8f940dfc41ceb305f049410f669eb959179ef15df0eefea49c3a5e59be49f4eb18dcbd62ffd28cee3201c996c6e9c8b18d32bcfb4a60249952d5e0394d8147675c9caf6390e8c94a5e78b3e4b5d508d18c8e165c86dfbc622b2779089e8b6a3b1675f0c15d938596d3962c3a2d250bb1648de1148eb69343220fdf40b8eb6214d22077f8050a64a2e0f06b8079ba078b528c26e3c2a8a080a40f0ac2403af62af037bb1effb5ed21df087c887d61d67f2c426984393d326bee408b0f6f577abec14c5751f5e2392a860061156b49fac265334a05f5feec95f3d3a5e4fd15050baf2245947260a2696702e536b81ecc75f4e6be98b684fadb7c0995971d22cbe1b01b57eef120d7b7c346ac4b3648888a72f3307719baa129621f5c5fa72ef572a6e31c0c1dc2cbb32246903a7175a3825764fd2954640326e8e5d07b88bc2296397a294bf9776c0e02b7670852b266e4b8a24e3d584625a5f5645b4196157eead37b6f1f631deb1b333ace5e56e3433f2136876687058761a695b820b4cdfed6247fd23e1343f04a2d3f983e849d841172e3ec6f1310f77b5c3ae84da6be5abfea0bc4112766a73f798a8e308dbc00af3f1babeb4667736fd7e81efd14677e37184b9c8c07af76a93533214e90f82f52286f05682f261a18b846275e2af26674f991083c686c02c20937fe2a111bc344612c4f2132879528bb1efc5d492547f1d9b715f33e1fb3571bbbc8f121a6165052172e1221ed77661c72440e6f8928fcefeb917bb10f878190de6c5200e15431189149bfbd547e0946a1741c54cdd0d02b85b4e63b6278615e7a483e70dc5f6dcd2500c75705afb33df82956d1a3fdf688b69e8ffc1b4c15ef4673b1e04f7e8689d4d9600e61b2774581847c985bce5c0bee99874913e3c963603c8f1a7d7f7c08e17b1cae37dd53200d68e5bfcbf4e0ae22478d47dc6b55e4002f9e12af8fd74e00685af0d3d8c266f2832cbbf7e717253fecf97edbfe5705f4124c122018d2b509502b329ae2a8b90483da29f30d018290570a6293c8fb0923c69108328db8f12074dad518eca6d113fa3e550736b37c2c4b4ee71fa97421279769bf1fa46434334b4f20607b9197a6bb2858ac54e7aca96924045b180d668d87bf485a4b8e3029f1976a9d957b6536b3597705fcf3536e35cc105fcde50c2bd83c2b2143c5b6da1e6b7b363de47af40155514cbe1f892503f1e82ecd72f9ea336faf5a2e60e9b93db84a9d44be354b961ad0e5c2156995d0e722da14d4bdd5cc05e24bee15b10907fdeb5c3accaf43ebc54b4d03a8f6222d64940a45e00a9705bb9826b0bd82fc5fafd36d8250ca3f51b5b3819a6352bd2fcb68dbef0bfd2540ea0fff27185dbca6740f063d94ecbe24d70a10f64d528737736f22e50fd841430877ae047fe57f0f6a2b6a0f1535f1716d4f52f267c4c5319c317c4856315f4487ea55b675df280781b66a8f816c4024bbc12d46bcbfd0bf42fea719b0d4b8e54c1087fe8d46a211984a1e73c0438ddbb2b1becf452f486669f36d5faea35360c4753a5a6e2fa28f6853b57878f3f879116163231d8cccdd4c8b2e8d59a033f5330b779d1026a74735df6f94d9e54df892e8c8570e5c8b34eeb7c22ed59ca1ada70c3516eab6b3458e4ba0d35b7631e210c3c31c099b75ef435053bd9946e"}], 0x2008}, 0x0) [ 2248.443305][T27720] ERROR: (device loop3): remounting filesystem as read-only [ 2248.506068][T27720] xtLookup: xtSearch returned -5 [ 2248.553462][T27720] read_mapping_page failed! [ 2248.580002][T27720] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2248.617422][T27720] Mount JFS Failure: -5 [ 2248.643155][T27720] jfs_mount failed w/return code = -5 [ 2248.714123][T27720] loop3: detected capacity change from 0 to 386 [ 2248.737389][T27720] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2248.737389][T27720] [ 2248.772770][T27720] ERROR: (device loop3): remounting filesystem as read-only [ 2248.807816][T27720] xtLookup: xtSearch returned -5 [ 2248.827212][T27720] read_mapping_page failed! [ 2248.832457][T27720] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2248.839571][T27720] Mount JFS Failure: -5 [ 2248.843785][T27720] jfs_mount failed w/return code = -5 08:12:12 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="44c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:12 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000200)="c9", 0x1}], 0x3}, 0x0) 08:12:12 executing program 1: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz1\x00', 0x1ff) 08:12:12 executing program 0: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x80082407, &(0x7f0000000000)='-:#],!,$\':\xcc\x00') 08:12:12 executing program 2: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000300)='cpu%cct.usage_sys\x00') 08:12:12 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x12, 0x7f, 0x4, 0x285, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8000000}, 0x40) 08:12:12 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x4, 0x0, 0x5016, 0x248}, 0x40) 08:12:12 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000001b7c0)=@bpf_lsm={0x2, 0x2, &(0x7f0000000000)=@raw=[@alu={0x4, 0x0, 0xb, 0x0, 0x0, 0xfffffffffffffffc}, @exit], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:12:12 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x3, 0x160, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/user\x00') 08:12:12 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x7, 0x4, &(0x7f0000000240)=@framed={{}, [@call]}, &(0x7f0000000040)='GPL\x00', 0x6, 0x8a, &(0x7f0000000080)=""/138, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:12:12 executing program 2: socketpair(0x10, 0x2, 0x19, &(0x7f0000000080)) [ 2249.152990][T27754] loop3: detected capacity change from 0 to 386 [ 2249.207024][T27754] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2249.207024][T27754] 08:12:12 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/user\x00') write$cgroup_devices(r0, 0x0, 0x0) [ 2249.304613][T27754] ERROR: (device loop3): remounting filesystem as read-only [ 2249.366166][T27754] xtLookup: xtSearch returned -5 [ 2249.407570][T27754] read_mapping_page failed! [ 2249.445558][T27754] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2249.503247][T27754] Mount JFS Failure: -5 [ 2249.522511][T27754] jfs_mount failed w/return code = -5 [ 2249.644795][T27754] loop3: detected capacity change from 0 to 386 [ 2249.674036][T27754] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2249.674036][T27754] [ 2249.713731][T27754] ERROR: (device loop3): remounting filesystem as read-only [ 2249.744802][T27754] xtLookup: xtSearch returned -5 [ 2249.767715][T27754] read_mapping_page failed! [ 2249.789875][T27754] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2249.812269][T27754] Mount JFS Failure: -5 [ 2249.831614][T27754] jfs_mount failed w/return code = -5 08:12:13 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="51c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:13 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f000000bdc0)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f000000c1c0)={0x0, 0x0, &(0x7f000000c0c0)=[{&(0x7f000000be80)="b9", 0x1}, {&(0x7f000000bf00)="c6", 0x1}, {&(0x7f000000bf80)="1a", 0x1}], 0x3}, 0x0) 08:12:13 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f0000000080)=""/170, 0x26, 0xaa, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f0000000240), 0x8, 0x10, 0x0}, 0x78) 08:12:13 executing program 0: perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:12:13 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x0, 0x4, 0x0, 0x6a0, 0x1}, 0x40) [ 2250.229967][T27787] loop3: detected capacity change from 0 to 386 [ 2250.243841][T27787] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2250.243841][T27787] [ 2250.254191][T27787] ERROR: (device loop3): remounting filesystem as read-only [ 2250.264380][T27787] xtLookup: xtSearch returned -5 [ 2250.271478][T27787] read_mapping_page failed! 08:12:13 executing program 5: r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) 08:12:13 executing program 2: r0 = perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r0, 0x0) 08:12:13 executing program 1: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000004c0)={0x0, 0x0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 08:12:13 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x3, 0x4, &(0x7f0000000380)=@framed={{}, [@alu={0x0, 0x0, 0x2, 0x0, 0x0, 0xc4}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:12:13 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(r0, &(0x7f00000010c0)={0x0, 0x0, 0x0}, 0x0) [ 2250.276145][T27787] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2250.283952][T27787] Mount JFS Failure: -5 [ 2250.288340][T27787] jfs_mount failed w/return code = -5 [ 2250.367680][T27787] loop3: detected capacity change from 0 to 386 [ 2250.438494][T27787] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2250.438494][T27787] 08:12:13 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0xffffffffffffffff) 08:12:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) close(r0) sendmsg(r1, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) [ 2250.593454][T27787] ERROR: (device loop3): remounting filesystem as read-only [ 2250.618346][T27787] xtLookup: xtSearch returned -5 [ 2250.651694][T27787] read_mapping_page failed! [ 2250.693682][T27787] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2250.749749][T27787] Mount JFS Failure: -5 [ 2250.769991][T27787] jfs_mount failed w/return code = -5 08:12:14 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="6fc4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:14 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0x22, &(0x7f0000000140)={0x0, 0x0, 0x18}, 0xc) 08:12:14 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000500)="fb", 0x1}], 0x1}, 0x8080) 08:12:14 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000012c0)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x2}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001a00)=""/177, 0x29, 0xb1, 0x1}, 0x20) 08:12:14 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2251.084225][T27820] loop3: detected capacity change from 0 to 386 [ 2251.121532][T27820] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2251.121532][T27820] [ 2251.133807][T27820] ERROR: (device loop3): remounting filesystem as read-only [ 2251.142923][T27820] xtLookup: xtSearch returned -5 [ 2251.148079][T27820] read_mapping_page failed! [ 2251.154050][T27820] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2251.163133][T27820] Mount JFS Failure: -5 [ 2251.167362][T27820] jfs_mount failed w/return code = -5 [ 2251.219442][T27820] loop3: detected capacity change from 0 to 386 [ 2251.230304][T27820] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2251.230304][T27820] [ 2251.411650][T27820] ERROR: (device loop3): remounting filesystem as read-only [ 2251.429152][T27820] xtLookup: xtSearch returned -5 [ 2251.436653][T27820] read_mapping_page failed! [ 2251.451440][T27820] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2251.467750][T27820] Mount JFS Failure: -5 [ 2251.474852][T27820] jfs_mount failed w/return code = -5 08:12:14 executing program 5: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={0xffffffffffffffff}, 0x4) 08:12:14 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x46, &(0x7f00000000c0), 0xfcfb) 08:12:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000003280)={0x0, 0x0, &(0x7f0000001ec0)=[{0x0}, {0x0}, {&(0x7f0000000a80)='7', 0x1}], 0x3}, 0x0) 08:12:14 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000340)={&(0x7f0000000080)=@un=@file={0x1, './file0\x00'}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[], 0x1c0}, 0x0) 08:12:14 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x1, 0x6, 0xc001, 0x101, 0xc, 0x1}, 0x40) 08:12:14 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="88c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:15 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xd4, &(0x7f0000000180)=""/212, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:12:15 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x5452, 0xfffffffffffffffe) 08:12:15 executing program 0: socketpair(0x2, 0x1, 0x0, &(0x7f0000000a40)) [ 2251.856481][T27841] loop3: detected capacity change from 0 to 386 [ 2251.925798][T27841] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2251.925798][T27841] 08:12:15 executing program 5: unlink(&(0x7f000000a380)='./file0\x00') bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 08:12:15 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x16, 0x0, 0x81, 0xff, 0x4, 0x1}, 0x40) [ 2251.977171][T27841] ERROR: (device loop3): remounting filesystem as read-only [ 2251.987453][T27841] xtLookup: xtSearch returned -5 [ 2251.994514][T27841] read_mapping_page failed! [ 2251.999979][T27841] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2252.007827][T27841] Mount JFS Failure: -5 [ 2252.014809][T27841] jfs_mount failed w/return code = -5 08:12:15 executing program 4: bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000780)='./file0\x00', 0x0) 08:12:15 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x100, 0x8, 0x2, 0x0, 0x1}, 0x40) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, 0x0}, 0x20) 08:12:15 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x4, &(0x7f0000000240)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x24}]}, &(0x7f0000000040)='GPL\x00', 0x6, 0x8a, &(0x7f0000000080)=""/138, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:12:15 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000800)="d7e49c53ad64cf27d58f7e0f146f63eb78b998d011f26ac7bfa6435b9167c196ebe55409b0dbdd3da4441b7f177d274e3d715f8969e70a84ae32e412147fab3ac32bbd4351afe852010c4a72f6f10ac63554dd789bba39113fb3170cfee11dd012ba96c169d038d1a5c0eaeed4db6178254151457d499b9e3f7fc6b73d79603c5925050e90265c4717c13696c4fd100367e06cf5ab04df4f7aa360807a231f0486e7bdcc1715eab08a8178f97aefdc435de38dd53a75166acf6a320e8b46cd963622236fe86f2cbe33e295f4469669265ceb2ee0", 0xd4}, {&(0x7f0000000980)="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", 0xded}], 0x2}, 0x0) close(r1) [ 2252.133696][T27841] loop3: detected capacity change from 0 to 386 08:12:15 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001980)={0x6, 0x3, &(0x7f00000012c0)=@framed, &(0x7f0000001300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000016c0)={r0, 0xc0, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 2252.186557][T27841] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2252.186557][T27841] 08:12:15 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x541b, 0x541000) [ 2252.198802][T27862] syz-executor.2[27862] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2252.294689][T27841] ERROR: (device loop3): remounting filesystem as read-only [ 2252.399576][T27841] xtLookup: xtSearch returned -5 [ 2252.415335][T27841] read_mapping_page failed! [ 2252.435283][T27841] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2252.456218][T27841] Mount JFS Failure: -5 [ 2252.471218][T27841] jfs_mount failed w/return code = -5 08:12:15 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c40a5f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:15 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000001400)={0xe}, 0x40) 08:12:15 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x3, &(0x7f0000000080)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000000540)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r0, 0x20000400, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 08:12:15 executing program 2: r0 = getpid() perf_event_open(&(0x7f0000000f40)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) [ 2252.780112][T27881] loop3: detected capacity change from 0 to 386 [ 2252.802937][T27881] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2252.802937][T27881] 08:12:16 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x9, 0x200, 0x2, 0x0, 0x1}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r0, 0x4) 08:12:16 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, r0, 0x0, 0xffffffffffffffff, 0x4) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080), 0x10) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x80, 0xff, 0x3, 0x5, 0x0, 0x9, 0x20022, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3f, 0x4, @perf_config_ext={0xffff, 0x9}, 0x0, 0xffffffff, 0xffffffff, 0x5, 0x81, 0x6, 0x5, 0x0, 0xc, 0x0, 0x1}, 0x0, 0x4, r1, 0x9) r2 = openat$cgroup(r0, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080), 0x10) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) perf_event_open$cgroup(&(0x7f0000000140)={0x4, 0x80, 0x9, 0x4e, 0x2, 0x40, 0x0, 0x6, 0x1802, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff39aa, 0x0, @perf_bp={&(0x7f0000000100), 0x9}, 0x6000, 0x3, 0x26, 0x9, 0x4, 0x2, 0x6, 0x0, 0x4fcf9069, 0x0, 0x10001}, r2, 0x2, r3, 0x2) mkdirat$cgroup(r2, &(0x7f0000000040)='syz0\x00', 0x1ff) 08:12:16 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5, 0x6, 0x5602, 0x101, 0x0, r0, 0x81}, 0x40) 08:12:16 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x3, &(0x7f0000000340)=@raw=[@initr0, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}], &(0x7f0000000380)='syzkaller\x00', 0x6, 0x84, &(0x7f00000003c0)=""/132, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:12:16 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000000)) [ 2252.838869][T27881] ERROR: (device loop3): remounting filesystem as read-only [ 2252.872084][T27881] xtLookup: xtSearch returned -5 [ 2252.888172][T27881] read_mapping_page failed! [ 2252.893777][T27881] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2252.902975][T27881] Mount JFS Failure: -5 [ 2252.907395][T27881] jfs_mount failed w/return code = -5 [ 2252.966294][T27881] loop3: detected capacity change from 0 to 386 [ 2252.982488][T27881] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2252.982488][T27881] [ 2252.996084][T27881] ERROR: (device loop3): remounting filesystem as read-only [ 2253.005180][T27881] xtLookup: xtSearch returned -5 [ 2253.011125][T27881] read_mapping_page failed! [ 2253.015878][T27881] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2253.024219][T27881] Mount JFS Failure: -5 [ 2253.028583][T27881] jfs_mount failed w/return code = -5 08:12:16 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)=[{0x0}, {&(0x7f0000000280)="85", 0x1}], 0x2}, 0x0) 08:12:16 executing program 1: r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1) 08:12:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@typedef={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x61, 0xe]}}, &(0x7f00000000c0)=""/154, 0x2b, 0x9a, 0x1}, 0x20) 08:12:16 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4225f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:16 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000002500)={0x1, 0x2, 0x9, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x40) 08:12:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array]}}, &(0x7f0000000100)=""/148, 0x32, 0x94, 0x8}, 0x20) 08:12:16 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4}, 0x48) [ 2253.408918][T27911] BPF:[1] ARRAY (anon) [ 2253.426870][T27912] loop3: detected capacity change from 0 to 386 [ 2253.436129][T27911] BPF:type_id=0 index_type_id=0 nr_elems=0 [ 2253.466996][T27911] BPF: [ 2253.490097][T27912] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2253.490097][T27912] [ 2253.501944][T27911] BPF:Invalid elem [ 2253.506017][T27911] BPF: [ 2253.506017][T27911] [ 2253.512148][T27912] ERROR: (device loop3): remounting filesystem as read-only [ 2253.519714][T27912] xtLookup: xtSearch returned -5 [ 2253.524683][T27912] read_mapping_page failed! [ 2253.529327][T27912] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2253.535593][T27912] Mount JFS Failure: -5 08:12:16 executing program 5: r0 = perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r0, 0x2) 08:12:16 executing program 2: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000001b7c0)=@bpf_lsm={0x2, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f00000018c0)={r0, 0x0, 0x0}, 0x10) 08:12:16 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x1c, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:12:16 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) bpf$MAP_DELETE_ELEM(0x23, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000080)}, 0x20) 08:12:16 executing program 1: perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000340)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0x114) [ 2253.540106][T27912] jfs_mount failed w/return code = -5 [ 2253.592020][T27912] loop3: detected capacity change from 0 to 386 [ 2253.606619][T27912] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2253.606619][T27912] 08:12:17 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000001d00)={0x0, 0xffffff7f, &(0x7f0000001c00)=[{&(0x7f0000000940)="ee", 0x8ec0}], 0x300}, 0x0) [ 2253.636214][T27912] ERROR: (device loop3): remounting filesystem as read-only 08:12:17 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x4, &(0x7f0000000380)=@framed={{}, [@alu={0x7, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffff0}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 2253.711975][T27912] xtLookup: xtSearch returned -5 [ 2253.717138][T27912] read_mapping_page failed! [ 2253.729277][T27912] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2253.737455][T27912] Mount JFS Failure: -5 [ 2253.748923][T27912] jfs_mount failed w/return code = -5 08:12:17 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x9, 0x200, 0x2, 0x0, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, r0, 0x62e7863a1909c179}, 0x38) 08:12:17 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb7efca96bcbb7796}, 0x40) 08:12:17 executing program 2: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:12:17 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4235f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:17 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x1, 0x400, 0x1, 0x9}, 0x40) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) [ 2254.077290][T27947] loop3: detected capacity change from 0 to 386 [ 2254.100347][T27947] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2254.100347][T27947] [ 2254.133560][T27947] ERROR: (device loop3): remounting filesystem as read-only [ 2254.168828][T27947] xtLookup: xtSearch returned -5 [ 2254.193687][T27947] read_mapping_page failed! [ 2254.213590][T27947] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2254.239802][T27947] Mount JFS Failure: -5 [ 2254.257086][T27947] jfs_mount failed w/return code = -5 [ 2254.320141][T27947] loop3: detected capacity change from 0 to 386 [ 2254.344218][T27947] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2254.344218][T27947] 08:12:17 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x8, 0x8000, 0xffffff7f, 0x0, 0x1}, 0x40) 08:12:17 executing program 4: r0 = socket(0x1, 0x5, 0x0) sendmmsg$inet6(r0, 0x0, 0x0, 0x40) 08:12:17 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x4, &(0x7f0000000380)=@framed={{}, [@alu={0x7, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffff0}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:12:17 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f00000000c0)={&(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x1}}}, 0x10, 0x0}, 0x0) 08:12:17 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x1ff) socketpair$tipc(0x2c, 0x0, 0x0, &(0x7f0000000000)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) [ 2254.392196][T27947] ERROR: (device loop3): remounting filesystem as read-only [ 2254.421071][T27947] xtLookup: xtSearch returned -5 [ 2254.426219][T27947] read_mapping_page failed! [ 2254.488182][T27947] jfs_mount: diMount(ipaimap) failed w/rc = -5 08:12:17 executing program 2: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000009c0), 0x8a001, 0x0) close(r0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) [ 2254.537793][T27947] Mount JFS Failure: -5 08:12:17 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000640)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) [ 2254.579785][T27947] jfs_mount failed w/return code = -5 08:12:17 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)) 08:12:17 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x40305828, 0x4af000) 08:12:18 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f000000c780)={&(0x7f000000c600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0x5, 0x0, 0x0, 0xe, 0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, &(0x7f000000c6c0)=""/150, 0x2f, 0x96, 0x1}, 0x20) 08:12:18 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4255f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x0, 0x0, 0x0, 0x10}]}}, &(0x7f00000002c0)=""/157, 0x26, 0x9d, 0x1}, 0x20) 08:12:18 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x8, 0x1}]}]}, {0x0, [0x0, 0x30]}}, &(0x7f0000000100)=""/4096, 0x30, 0x1000, 0x1}, 0x20) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x303a42, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001100)='./cgroup/syz0\x00', 0x200002, 0x0) close(r0) 08:12:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x7, 0x32, 0x0, 0x0) 08:12:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)='s', 0x1}], 0x1}, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640)=[{0x0, 0x7ffff000}, {0x0}, {&(0x7f0000000500)=""/141, 0x8d}], 0x3}, 0x0) 08:12:18 executing program 2: bpf$OBJ_GET_MAP(0x1e, &(0x7f0000001bc0)={0x0, 0x0, 0x18}, 0x10) 08:12:18 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x9, 0x4, &(0x7f0000000240)=@framed={{}, [@call]}, &(0x7f0000000040)='GPL\x00', 0x6, 0x8a, &(0x7f0000000080)=""/138, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 2254.921845][T27980] loop3: detected capacity change from 0 to 386 [ 2254.954438][T27980] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2254.954438][T27980] 08:12:18 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, &(0x7f0000007e80)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x79) [ 2255.040297][T27980] ERROR: (device loop3): remounting filesystem as read-only [ 2255.047873][T27980] xtLookup: xtSearch returned -5 [ 2255.053421][T27980] read_mapping_page failed! [ 2255.058188][T27980] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2255.066571][T27980] Mount JFS Failure: -5 [ 2255.073656][T27980] jfs_mount failed w/return code = -5 [ 2255.148141][T27980] loop3: detected capacity change from 0 to 386 [ 2255.166913][T27980] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2255.166913][T27980] [ 2255.188059][T27980] ERROR: (device loop3): remounting filesystem as read-only 08:12:18 executing program 5: perf_event_open(&(0x7f0000000240)={0x8, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:12:18 executing program 0: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x80, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:12:18 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x0, 0x409}, 0x40) 08:12:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000012c0)={&(0x7f0000001340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func={0x0, 0x0, 0x0, 0xe}]}}, &(0x7f0000001a00)=""/177, 0x26, 0xb1, 0x1}, 0x20) [ 2255.208854][T27980] xtLookup: xtSearch returned -5 [ 2255.214313][T27980] read_mapping_page failed! [ 2255.219527][T27980] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2255.226619][T27980] Mount JFS Failure: -5 [ 2255.231986][T27980] jfs_mount failed w/return code = -5 08:12:18 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c42a5f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:18 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0xa, &(0x7f0000000000)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @generic={0x5, 0x1, 0x1, 0x1f, 0x10001}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x12, &(0x7f00000000c0)=""/18, 0x40f00, 0x15, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x9, 0x0, 0x8a2}, 0x10}, 0x78) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) sendmsg(r0, &(0x7f0000000680)={&(0x7f0000000240)=@rxrpc=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e23, @broadcast}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000340)}], 0x1}, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) 08:12:18 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f000000de40)={0x2, 0x4, 0xe0, 0x10001, 0x500}, 0x40) 08:12:18 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x18, 0x9, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@exit, @map, @ldst={0x1, 0x0, 0x3, 0xb, 0x3, 0x20, 0x1}, @jmp={0x5, 0x1, 0x0, 0x0, 0x0, 0x30, 0x4}, @exit]}, &(0x7f0000000300)='GPL\x00', 0x1ff, 0xda, &(0x7f0000000340)=""/218, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0)={0x1, 0xf, 0xacfe, 0x7}, 0x10}, 0x78) 08:12:18 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x15, 0x8, 0x13}, 0x40) 08:12:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2255.517865][T28011] loop3: detected capacity change from 0 to 386 08:12:18 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x43, &(0x7f00000000c0), 0xfcfb) 08:12:18 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x5, &(0x7f0000001f00)=@framed={{}, [@func, @alu]}, &(0x7f0000000900)='GPL\x00', 0x5, 0xc5, &(0x7f0000000940)=""/197, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:12:19 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000440)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @dev}, 0x80, 0x0}, 0x20008041) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000100)=@in={0x2, 0x0, @dev={0xac, 0x2}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="c4", 0x1}], 0x1, &(0x7f0000000a00)=ANY=[@ANYBLOB="188e097ee0bc676bdb07d710e0346f0000004000000084000000070000007800000000000000d3203ef88331effd1f9616bf92c2b09c4a4e75bbe0e091f54c94404b403460365ca02cd7a8502d8f69ed5c41da560f"], 0x18}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x0, 0x47, 0x9, 0x4, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_config_ext={0x6700, 0x6}, 0x8004, 0x80000000, 0x4, 0x5, 0x1ff, 0x7, 0x0, 0x0, 0x8, 0x0, 0xfff}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) sendmsg$sock(r2, &(0x7f00000006c0)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x1, @loopback}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000480)="a62ed7bda370f8fcce7ed9d00125c9aee49d5ae7bf6f922b466679f4fd477dd9cd196469955dd0ba565282066d3e492d2c42109575342ee67dcb7199bfbb42bfd90d97b2c7566a678e5c6e9697b71015e4c3fd13bd43da43f88a73e2c1e8b330e2243eadf3bf841b92b0956e35439fc2931ae6d01b58bdadd480dff06a9540e1e3d71a951d90268e935ee6283bd81214e27f5d5ca53bcb3e06e40205639822ce705f46843c304eddb8ddb577b65cf210103644cf494debf83e796e5712b4f6125c22639172d79480d7", 0xc9}, {&(0x7f0000000300)="33165deff80e6f", 0x7}, {&(0x7f00000003c0)="06d9b4388143a02356aeca030a8b022806ee973e8aa2f091", 0x18}, {&(0x7f0000000580)="7f6aa05beaae6aa4e3f6072b8d386ed58a03e581d661d45fa0ac276bb469d34c1dee5cfd57ba79fda18b7a39ce83956abead219bf36a7ece0821ddf5a5a68a7aacc7712be02254654149fff2c9bf0f280eed2ef72ee94bb43f850070fdb1f14e4cea0473143ca531cc0b3fc80b16cc49417c5f4faec8eeea", 0x78}], 0x4, &(0x7f0000000740)=[@timestamping={{0x14, 0x1, 0x25, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @mark={{0x14}}], 0x78}, 0x44000) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x3f, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x3, 0x6, 0x6, 0x5, 0x4, 0x8}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0xf, &(0x7f0000000400), 0x8) sendmsg$inet(r3, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x8000) r4 = socket$kcm(0x10, 0x804000000002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000080)={r4}) socketpair(0x0, 0x0, 0x8, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000000)=r1, 0x4) 08:12:19 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) [ 2255.738244][T28011] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2255.738244][T28011] 08:12:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000007c0)='memory.events\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r0, 0x10d, 0xb, &(0x7f0000000000)=r1, 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) 08:12:19 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x5, 0x4, &(0x7f0000000240)=@framed={{}, [@call]}, &(0x7f0000000040)='GPL\x00', 0x6, 0x8a, &(0x7f0000000080)=""/138, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 2255.803407][T28011] ERROR: (device loop3): remounting filesystem as read-only [ 2255.879822][T28011] xtLookup: xtSearch returned -5 [ 2255.884811][T28011] read_mapping_page failed! [ 2255.941631][T28011] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2255.947961][T28011] Mount JFS Failure: -5 [ 2255.990472][T28011] jfs_mount failed w/return code = -5 [ 2256.061296][T28011] loop3: detected capacity change from 0 to 386 [ 2256.080171][T28011] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2256.080171][T28011] [ 2256.111685][T28011] ERROR: (device loop3): remounting filesystem as read-only [ 2256.136559][T28011] xtLookup: xtSearch returned -5 [ 2256.164100][T28011] read_mapping_page failed! [ 2256.183982][T28011] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2256.220288][T28011] Mount JFS Failure: -5 [ 2256.260214][T28011] jfs_mount failed w/return code = -5 08:12:19 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c42b5f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:19 executing program 2: perf_event_open(&(0x7f0000001100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:12:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x42, &(0x7f0000000180), 0x4) 08:12:19 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x4, &(0x7f0000000240)=@framed={{}, [@call={0x85, 0x4}]}, &(0x7f0000000040)='GPL\x00', 0x6, 0x8a, &(0x7f0000000080)=""/138, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:12:19 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x13, 0x8, 0x6, 0x0, 0x0, 0x1}, 0x40) 08:12:19 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f000000a000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001600)={&(0x7f0000000000)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000080)="06165a351ae1b67efc5efcf67622a791f6d065bde102b2032da3ae2f464960c067d7fa35aba7bfafb28aa74c6d2ff826d142abbeae7988cdee39663f6d548ad09572ffb89c00c9dbb6064e2ec3aef1203ed0cc02612d934702bdfa2834ee5d5ec580c8abe663f6790c8b7d21722e1b5752407b", 0x73}, {&(0x7f0000000100)="cd1fa6f0a1280125039e5c191770dc8caf32a99cf8ec6cb26c16fdad50812dab4d27ee7e6a98d896f3f841b2fadd8d9d5980c2e14b", 0x35}, {&(0x7f0000000140)="5cadfb0bad00", 0x6}, {&(0x7f0000000180)="cb78f9e9c8c47b3ac3f2764b7ba54f6994094aead769407b1d4ccaabd08f4663e9d0610230a89cf84e1900eb6cf6274a10757da9f3a68763b3624a92a5215a937ce4cec63194d934161598299580a3e2e5afd1a8a88e02bbd26aa62759c8753da4d28ebc29dae4a72661d9fb1c25ec4b90bbf406e8397975bc0b9e15517ab7446278fb4bde9ff47b99284747ad0b3e2920c6224f431c2efd7bed6afe6e0f5b0bf08e598c17e11ce49f738b1dab12c0477911b09fa410286c6c2eb321096af3b4bb3a431a99b6960f1f97dfcfac8484cc860ae84567c1fb09ba3930278d702f0b8fc43a16dc371e620f658b8e81c6d8", 0xef}], 0x4, &(0x7f00000002c0)=[{0xb0, 0x0, 0x0, "8da9c60a26c7ffd876a6cd72aec0edbbd6d47c903e1d30b0eb64da4ef11b8dd59be455f2000fd62a2ef25bfcbd409ba24c09add02cbe51555a656e98e36d09d89737bbc7cdc9fbc62e666382bf9f9bd83464ded13d3928325b00eb0223b6e7882619dc31b26118af0f822518e33448f0abb8f2f561b8b18d9b02052e40883c78306c10b255780275e55f0f9ede7304571f10d3387973a4451c7d181b0adc"}, {0xa8, 0x0, 0x0, "489f184fc5cc074f8b4f023988ae2e6bd849feaec4c3751dc0dfe5ee70e8d44328e8cdb12aa26646e28f87c9afbde161429e7e250d52bbbf7127b2bb4ccc9f2c39e9c48e390ac2951268da8b293fa0e0328defae591f7fb3e9b10bb4bbd1ec5329962c069406b65188473a2df4cdf90dee2dd22389f67a6d32671e55b389c0f36662f71985ce8df2ebed7b899745f0094d3e70"}, {0xf8, 0x0, 0x0, "4853a72093c1fba63217fa9c12254b0222db616e2fc089c7c7ffdcd8bb05fea46c1ff2614d9e5c36f2ba23261c89ca592a2cceefc3b3c38f53958853f792614d86e91c0519ad7f64c240e18d5b491f8ad999c1593083945fea9cf4a2ffab077e793392b1459f5c1883baaf916c8210b5d6940baab9a2678d8d6aac950bb42ae7e1ae0fb46bf56febf9547f6923a8195f642cf473597a6385f58c1a6292c12f7b4449e529a8efa9bd4f2d18dd0eb443e1b8c8b90a2aa7f81f9a2a981b212949f76fc8b32cfede9faff5d3312f528ec1332128ff9f7432011fba5041f96b22fed13d1364d9dd9bb257"}, {0x106d, 0x0, 0x0, "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"}, {0xc0, 0x0, 0x0, "9fed290959fed45fdbae6e570b3adae996c2d34bbd82d4b0cc2b593712a26488a6dc2a92629dbf3471a496c58e2eb7327542144b7b5d35bd0439c39b2876260aa514c83c69f429e9d5e9d0f66087b29ba9f7d85f822987daeabd9ee0157fbb5703bb260a8f4737ea3a9f3d85afb1539bdd6d72790cc6df5e894e21febbc97bce288a533bc0670da65d7d104123a8885e38809d56a881bd88e107f767ac719d7118c0e7766b7ad231ba"}], 0x1320}, 0xc0) 08:12:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) close(r0) recvmsg(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) 08:12:19 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f000000d800)={0x1c, 0x0, 0x0, 0x2, 0x1}, 0x40) 08:12:19 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x12, 0x7f, 0x4, 0x285, 0x10}, 0x40) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000100)={r0, 0x0, 0x0}, 0x20) 08:12:19 executing program 4: perf_event_open$cgroup(&(0x7f00000003c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:12:19 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffeffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000080)={'team0\x00'}) [ 2256.590980][T28053] loop3: detected capacity change from 0 to 386 08:12:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x40002020) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) [ 2256.698666][T28053] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2256.698666][T28053] [ 2256.770383][T28053] ERROR: (device loop3): remounting filesystem as read-only [ 2256.777862][T28053] xtLookup: xtSearch returned -5 [ 2256.784575][T28053] read_mapping_page failed! [ 2256.789620][T28053] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2256.796070][T28053] Mount JFS Failure: -5 [ 2256.801778][T28053] jfs_mount failed w/return code = -5 [ 2256.852120][T28053] loop3: detected capacity change from 0 to 386 [ 2256.863063][T28053] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2256.863063][T28053] [ 2256.873676][T28053] ERROR: (device loop3): remounting filesystem as read-only [ 2256.881243][T28053] xtLookup: xtSearch returned -5 [ 2256.886573][T28053] read_mapping_page failed! [ 2256.892024][T28053] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2256.898455][T28053] Mount JFS Failure: -5 [ 2256.903093][T28053] jfs_mount failed w/return code = -5 08:12:20 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c42c5f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:20 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x12, 0x100, 0x8, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40) 08:12:20 executing program 0: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000880)='memory.high\x00', 0x2, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000017700)={0x0, 0x0, &(0x7f0000017580)=[{0x0}], 0x1, &(0x7f0000017600)=""/219, 0xdb}, 0x0) 08:12:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000006c0)=""/157, 0x32, 0x9d, 0x1}, 0x20) 08:12:20 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001980)={0x8, 0x3, &(0x7f00000012c0)=@framed, &(0x7f0000001300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={r0}, 0xc) 08:12:20 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002c40)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000080)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @jmp]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:12:20 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x5421, 0x4fd000) 08:12:20 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) 08:12:20 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0xc, &(0x7f00000000c0), 0xfcfb) 08:12:20 executing program 2: bpf$MAP_CREATE(0xc, 0x0, 0x0) 08:12:20 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x15, 0x8, 0x9, 0x2}, 0x40) 08:12:20 executing program 2: perf_event_open(&(0x7f0000000480)={0x0, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2257.172773][T28086] loop3: detected capacity change from 0 to 386 [ 2257.235701][T28086] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2257.235701][T28086] [ 2257.341674][T28086] ERROR: (device loop3): remounting filesystem as read-only [ 2257.412401][T28086] xtLookup: xtSearch returned -5 [ 2257.457383][T28086] read_mapping_page failed! [ 2257.485928][T28086] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2257.522298][T28086] Mount JFS Failure: -5 [ 2257.527095][T28086] jfs_mount failed w/return code = -5 [ 2257.629631][T28086] loop3: detected capacity change from 0 to 386 [ 2257.653480][T28086] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2257.653480][T28086] [ 2257.705112][T28086] ERROR: (device loop3): remounting filesystem as read-only [ 2257.738722][T28086] xtLookup: xtSearch returned -5 [ 2257.765276][T28086] read_mapping_page failed! [ 2257.790586][T28086] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2257.817656][T28086] Mount JFS Failure: -5 [ 2257.836822][T28086] jfs_mount failed w/return code = -5 08:12:21 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c42d5f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:21 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000001ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001e80)=[@timestamping={{0xf}}], 0x18}, 0x0) 08:12:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x15}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0x301) [ 2258.077569][T28112] loop3: detected capacity change from 0 to 386 [ 2258.104526][T28112] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2258.104526][T28112] [ 2258.126015][T28112] ERROR: (device loop3): remounting filesystem as read-only [ 2258.137714][T28112] xtLookup: xtSearch returned -5 [ 2258.147593][T28112] read_mapping_page failed! [ 2258.165835][T28112] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2258.172499][T28112] Mount JFS Failure: -5 08:12:21 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0xa02, 0x0) 08:12:21 executing program 1: socketpair(0xa, 0x1, 0x106, &(0x7f0000000780)) 08:12:21 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2b, 'rdma'}]}, 0x6) 08:12:21 executing program 4: bpf$MAP_CREATE(0x8, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 08:12:21 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x4, &(0x7f0000000080)=@framed={{}, [@func={0x85, 0x0, 0x9}]}, &(0x7f00000000c0)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000000540)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 2258.176699][T28112] jfs_mount failed w/return code = -5 08:12:21 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f000000bdc0)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f000000c1c0)={0x0, 0x0, &(0x7f000000c0c0)=[{0x0, 0x2}, {&(0x7f000000bf00)="c6", 0x1}], 0x2}, 0x0) [ 2258.245242][T28112] loop3: detected capacity change from 0 to 386 [ 2258.254941][T28112] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2258.254941][T28112] [ 2258.266595][T28112] ERROR: (device loop3): remounting filesystem as read-only [ 2258.276073][T28112] xtLookup: xtSearch returned -5 [ 2258.281395][T28112] read_mapping_page failed! [ 2258.287323][T28112] jfs_mount: diMount(ipaimap) failed w/rc = -5 08:12:21 executing program 5: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='cpuacct\x19\n\x9b.usag\x02\x00sys\x00') [ 2258.294191][T28112] Mount JFS Failure: -5 [ 2258.299621][T28112] jfs_mount failed w/return code = -5 08:12:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x2}}, &(0x7f0000000340)=""/135, 0x1a, 0x87, 0x1}, 0x20) 08:12:21 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, 0x0}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000099c0)={0x2}, 0x8) 08:12:21 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c42e5f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:21 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x2}]}}, &(0x7f0000000380)=""/231, 0x26, 0xe7, 0x1}, 0x20) 08:12:21 executing program 0: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0x0, 0x0}, 0x8) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r1, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 08:12:21 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/cgroup\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') 08:12:21 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2, 'rdma'}]}, 0x6) 08:12:21 executing program 4: ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000480)=@framed, &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 08:12:22 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x1, 0x6, 0x4, 0x101, 0x0, 0x1}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000340)=r0, 0x4) [ 2258.660499][T28140] loop3: detected capacity change from 0 to 386 08:12:22 executing program 2: perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) 08:12:22 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000007480)={0x0, 0x0, &(0x7f00000073c0)=[{0x0}, {&(0x7f0000006ec0)=""/106, 0x6a}, {&(0x7f0000006f40)=""/43, 0x2b}], 0x3}, 0x2) sendmsg$inet(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000100)="1a", 0x101d0}], 0x1}, 0x0) [ 2258.833170][T28140] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2258.833170][T28140] [ 2258.892267][T28140] ERROR: (device loop3): remounting filesystem as read-only [ 2258.937338][T28140] xtLookup: xtSearch returned -5 [ 2258.963335][T28140] read_mapping_page failed! [ 2258.983468][T28140] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2259.006673][T28140] Mount JFS Failure: -5 [ 2259.017021][T28140] jfs_mount failed w/return code = -5 [ 2259.083751][T28140] loop3: detected capacity change from 0 to 386 [ 2259.100669][T28140] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2259.100669][T28140] [ 2259.283402][T28140] ERROR: (device loop3): remounting filesystem as read-only [ 2259.306864][T28140] xtLookup: xtSearch returned -5 [ 2259.313624][T28140] read_mapping_page failed! [ 2259.323716][T28140] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2259.339266][T28140] Mount JFS Failure: -5 [ 2259.360378][T28140] jfs_mount failed w/return code = -5 08:12:22 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000740)='k', 0x1}], 0x1}, 0x20000054) 08:12:22 executing program 4: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0x541b, 0x0) 08:12:22 executing program 0: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000280)={0x0, 0x0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 08:12:22 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001a40)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000100000d000000001000000005000000020000000200000604"], &(0x7f0000001480)=""/188, 0x4f, 0xbc, 0x1}, 0x20) 08:12:22 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c42f5f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x19, &(0x7f0000000180), 0x4) 08:12:23 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000480)={0x1, 0x0, 0x0, 0x0, 0x180}, 0x40) 08:12:23 executing program 0: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11aa22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8140}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:12:23 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2259.741038][T28174] loop3: detected capacity change from 0 to 386 08:12:23 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x12, 0x100, 0x8, 0x2, 0x0, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000080), 0x0}, 0x20) [ 2259.830172][T28174] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2259.830172][T28174] [ 2259.842163][T28174] ERROR: (device loop3): remounting filesystem as read-only [ 2259.851419][T28174] xtLookup: xtSearch returned -5 [ 2259.856509][T28174] read_mapping_page failed! [ 2259.863761][T28174] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2259.871699][T28174] Mount JFS Failure: -5 [ 2259.875989][T28174] jfs_mount failed w/return code = -5 08:12:23 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:12:23 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x4, &(0x7f0000000380)=@framed={{}, [@alu={0x7, 0x0, 0x8, 0x0, 0x0, 0xfffffffffffffff9}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 2259.955975][T28174] loop3: detected capacity change from 0 to 386 [ 2259.974110][T28174] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2259.974110][T28174] [ 2259.984659][T28174] ERROR: (device loop3): remounting filesystem as read-only [ 2259.993770][T28174] xtLookup: xtSearch returned -5 [ 2260.000912][T28174] read_mapping_page failed! 08:12:23 executing program 5: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:12:23 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000000100)='&', 0x1}], 0x2}, 0x0) 08:12:23 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000001e40)={0x0, &(0x7f0000001d00)=""/106, &(0x7f0000000a80), &(0x7f0000001d80), 0x1, r0}, 0x38) [ 2260.008965][T28174] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2260.017046][T28174] Mount JFS Failure: -5 [ 2260.024245][T28174] jfs_mount failed w/return code = -5 08:12:23 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)}, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000500)="fb", 0x1}], 0x1}, 0x8080) 08:12:23 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4305f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:23 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000011080)={&(0x7f0000010f00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x3}]}]}}, &(0x7f0000010fc0)=""/150, 0x2e, 0x96, 0x1}, 0x20) 08:12:23 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050000000850000000f00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000500)='ext4_mballoc_alloc\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) 08:12:23 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x35, &(0x7f00000000c0), 0xfcfb) 08:12:23 executing program 4: perf_event_open(&(0x7f0000000f40)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:12:23 executing program 1: socketpair(0x25, 0x5, 0x3, &(0x7f0000000040)) 08:12:23 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x17, 0x0, 0x8, 0x770, 0x0, 0x1}, 0x40) bpf$BPF_GET_MAP_INFO(0x2, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) 08:12:23 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x1, 0x400, 0x1, 0x9}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000040)={&(0x7f0000000000), 0x0, &(0x7f0000000240), &(0x7f0000000300), 0xfffffff9, r0}, 0x38) [ 2260.336586][T28213] loop3: detected capacity change from 0 to 386 08:12:23 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f00000005c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x3}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000680)=""/199, 0x2d, 0xc7, 0x1}, 0x20) 08:12:23 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x7, &(0x7f00000000c0), 0xfcfb) 08:12:23 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x12, &(0x7f00000000c0), 0xfcfb) 08:12:23 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000740)='k', 0xfffffdef}], 0x1}, 0x20000054) [ 2260.497852][T28213] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2260.497852][T28213] [ 2260.585784][T28213] ERROR: (device loop3): remounting filesystem as read-only [ 2260.628412][T28213] xtLookup: xtSearch returned -5 [ 2260.656305][T28213] read_mapping_page failed! [ 2260.676476][T28213] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2260.716589][T28213] Mount JFS Failure: -5 [ 2260.739253][T28213] jfs_mount failed w/return code = -5 [ 2260.805538][T28213] loop3: detected capacity change from 0 to 386 [ 2260.824536][T28213] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2260.824536][T28213] [ 2260.873380][T28213] ERROR: (device loop3): remounting filesystem as read-only [ 2260.911035][T28213] xtLookup: xtSearch returned -5 [ 2260.916062][T28213] read_mapping_page failed! [ 2260.951432][T28213] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2260.957765][T28213] Mount JFS Failure: -5 [ 2260.993416][T28213] jfs_mount failed w/return code = -5 08:12:24 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4585f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:24 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) 08:12:24 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x400, 0x1, 0x9}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r0, 0x4) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) 08:12:24 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 08:12:24 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000012c0)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@func={0x3, 0x0, 0x0, 0xd}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000001a00)=""/177, 0x28, 0xb1, 0x1}, 0x20) 08:12:24 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x12, 0xfffffff7, 0x8, 0x87}, 0x40) 08:12:24 executing program 2: perf_event_open(&(0x7f0000001440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:12:24 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x17, 0x0, 0x8, 0x770, 0x0, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) [ 2261.409724][T28255] loop3: detected capacity change from 0 to 386 [ 2261.449272][T28255] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2261.449272][T28255] [ 2261.496978][T28255] ERROR: (device loop3): remounting filesystem as read-only [ 2261.536527][T28255] xtLookup: xtSearch returned -5 [ 2261.545088][T28255] read_mapping_page failed! [ 2261.551021][T28255] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2261.557814][T28255] Mount JFS Failure: -5 [ 2261.564708][T28255] jfs_mount failed w/return code = -5 [ 2261.642808][T28255] loop3: detected capacity change from 0 to 386 [ 2261.668099][T28255] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2261.668099][T28255] 08:12:25 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0xff, 0xfecd, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000200), 0x10}, 0x78) 08:12:25 executing program 4: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1100000000000000, &(0x7f0000000180)={0x1d, 0x4, 0x2, 0x0, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:12:25 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000002c0)="e1", 0x1}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/57, 0x39}], 0x1}, 0x0) 08:12:25 executing program 0: socketpair(0x28, 0x0, 0x0, &(0x7f0000000200)) [ 2261.707065][T28255] ERROR: (device loop3): remounting filesystem as read-only [ 2261.725869][T28255] xtLookup: xtSearch returned -5 [ 2261.731827][T28255] read_mapping_page failed! [ 2261.736395][T28255] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2261.745553][T28255] Mount JFS Failure: -5 [ 2261.750419][T28255] jfs_mount failed w/return code = -5 08:12:25 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c45c5f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:25 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$sock(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x24008080) 08:12:25 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x5421, 0x4af000) 08:12:25 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1, 0x7, 0x7fff, 0x8}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r0, 0x28, &(0x7f00000001c0)={0x0, 0x0}}, 0x10) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r1, 0x0, 0x10}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x38) 08:12:25 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x1, 0x40200, 0x1, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x9}, 0x40) 08:12:25 executing program 0: socketpair(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f00000004c0)) [ 2262.047818][T28277] loop3: detected capacity change from 0 to 386 [ 2262.106430][T28277] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2262.106430][T28277] [ 2262.116848][T28277] ERROR: (device loop3): remounting filesystem as read-only [ 2262.125907][T28277] xtLookup: xtSearch returned -5 [ 2262.133581][T28277] read_mapping_page failed! [ 2262.138372][T28277] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2262.146180][T28277] Mount JFS Failure: -5 [ 2262.153162][T28277] jfs_mount failed w/return code = -5 08:12:25 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2262.196351][T28277] loop3: detected capacity change from 0 to 386 [ 2262.206553][T28277] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2262.206553][T28277] [ 2262.218439][T28277] ERROR: (device loop3): remounting filesystem as read-only [ 2262.226676][T28277] xtLookup: xtSearch returned -5 [ 2262.234004][T28277] read_mapping_page failed! [ 2262.238755][T28277] jfs_mount: diMount(ipaimap) failed w/rc = -5 08:12:25 executing program 4: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000000)='-:#],!,$\':\xcc\x00') [ 2262.248504][T28277] Mount JFS Failure: -5 [ 2262.257278][T28277] jfs_mount failed w/return code = -5 08:12:26 executing program 5: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) 08:12:26 executing program 0: socketpair(0x0, 0x0, 0x3, &(0x7f0000000000)) 08:12:26 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4635f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:26 executing program 1: openat$cgroup_devices(0xffffffffffffffff, 0xfffffffffffffffe, 0x2, 0x0) 08:12:26 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f000000a880)={0x0, 0x0, &(0x7f000000a740)=[{&(0x7f000000a480)=""/146, 0x92}], 0x1}, 0x0) sendmsg$inet(r1, &(0x7f000000aa40)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)='*', 0x1}], 0x1}, 0x0) 08:12:26 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8922, &(0x7f0000000000)={'macsec0\x00', @remote}) 08:12:26 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000180), 0x2, 0x0) write$cgroup_type(r1, &(0x7f00000001c0), 0x9) 08:12:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x2a, &(0x7f0000000180), 0x4) 08:12:26 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x100, 0x8, 0x2, 0xa, 0x1}, 0x40) [ 2263.136527][T28311] loop3: detected capacity change from 0 to 386 08:12:26 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000740)=[{0x0}, {&(0x7f0000000100)='l', 0x1}], 0x2}, 0x0) 08:12:26 executing program 4: bpf$ITER_CREATE(0x21, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000080)={'team0\x00'}) [ 2263.291668][T28311] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2263.291668][T28311] 08:12:26 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x15}, 0x40) [ 2263.406765][T28311] ERROR: (device loop3): remounting filesystem as read-only [ 2263.458773][T28311] xtLookup: xtSearch returned -5 [ 2263.487388][T28311] read_mapping_page failed! [ 2263.512592][T28311] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2263.542088][T28311] Mount JFS Failure: -5 [ 2263.570302][T28311] jfs_mount failed w/return code = -5 [ 2263.630360][T28311] loop3: detected capacity change from 0 to 386 [ 2263.646407][T28311] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2263.646407][T28311] [ 2263.709384][T28311] ERROR: (device loop3): remounting filesystem as read-only [ 2263.717232][T28311] xtLookup: xtSearch returned -5 [ 2263.722945][T28311] read_mapping_page failed! [ 2263.727810][T28311] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2263.735299][T28311] Mount JFS Failure: -5 [ 2263.742099][T28311] jfs_mount failed w/return code = -5 08:12:27 executing program 5: perf_event_open(&(0x7f0000000f40)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:12:27 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x3e) 08:12:27 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000700)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0) 08:12:27 executing program 4: openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) 08:12:27 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x12, 0x7f, 0x4, 0x285, 0x8}, 0x40) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) 08:12:27 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4695f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:27 executing program 1: syz_open_procfs$namespace(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) 08:12:27 executing program 0: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0x2405, 0x0) 08:12:27 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x1, 0x6, 0x8002, 0x101, 0x4, 0x1}, 0x40) 08:12:27 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000001040)={0x0, 0x0, 0x0}, 0x0) [ 2264.263182][T28344] loop3: detected capacity change from 0 to 386 08:12:27 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000d00)="84", 0xffffff01}], 0x1}, 0x0) [ 2264.330906][T28344] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2264.330906][T28344] 08:12:27 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000180), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='+file1,lowerdir=./bus,workdir=./file0,index']) mount$overlay(0x400406, &(0x7f0000000080)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f0000000040)={[{@lowerdir={'lowerdir', 0x3d, './file1'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './bus'}}, {@xino_auto}]}) [ 2264.387804][T28344] ERROR: (device loop3): remounting filesystem as read-only [ 2264.397042][T28344] xtLookup: xtSearch returned -5 [ 2264.405617][T28344] read_mapping_page failed! [ 2264.411587][T28344] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2264.420150][T28344] Mount JFS Failure: -5 [ 2264.439639][T28344] jfs_mount failed w/return code = -5 [ 2264.512515][T28344] loop3: detected capacity change from 0 to 386 [ 2264.543636][T28344] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2264.543636][T28344] [ 2264.554990][T28344] ERROR: (device loop3): remounting filesystem as read-only [ 2264.565719][T28344] xtLookup: xtSearch returned -5 [ 2264.573609][T28344] read_mapping_page failed! [ 2264.578424][T28344] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2264.588324][T28344] Mount JFS Failure: -5 [ 2264.593462][T28344] jfs_mount failed w/return code = -5 08:12:28 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x100, 0x8, 0x2, 0xa, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40) 08:12:28 executing program 5: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1100000000000000, &(0x7f0000000180)={0x1d, 0x4, 0x2, 0x0, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x40) 08:12:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@func={0x2, 0x0, 0x0, 0xc, 0x4}]}, {0x0, [0x0, 0x61]}}, &(0x7f0000000040)=""/247, 0x28, 0xf7, 0x1}, 0x20) 08:12:28 executing program 4: socketpair(0x11, 0x0, 0x0, &(0x7f00000000c0)) 08:12:28 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46c5f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:28 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000097c0)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8901, &(0x7f0000000000)={r1}) 08:12:28 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001f40)='net/rt6_stats\x00') [ 2265.256585][T28375] loop3: detected capacity change from 0 to 386 [ 2265.270718][T28375] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2265.270718][T28375] [ 2265.281764][T28375] ERROR: (device loop3): remounting filesystem as read-only [ 2265.292255][T28375] xtLookup: xtSearch returned -5 [ 2265.297351][T28375] read_mapping_page failed! 08:12:28 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001400)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 08:12:28 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x20000009}, 0x0) sched_setattr(0x0, &(0x7f0000000200)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x200000000011, r1, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="2ad64e75dc862951c4dd74ea2f342443b8f15269af7e7f4b5c716c80a3b2e4fc01e8ed739ff3336b5cd8757359bc69a3d5a377db24a22c4cf63d40b5ce62e441dd1ebf03d4ef13f853cb2c861188e039f89163f15bae004da8adccff5c53d46e19059f5a6df44f491edb7d7ae1493c84af5d000200004596a24533ffd3bad5d608b584242b3a451f0e50d31340fbb8c554105789862b60df74f940f02278e50c5ac4afd11510904654b3ca6635bce9b8"], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) socket$phonet(0x23, 0x2, 0x1) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240), 0x40, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000300), 0x440, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x0, 0x40, 0x0, 0x9}, 0x0) sendto$inet6(r0, &(0x7f0000000200)="03", 0x7ffff000, 0x40080, 0x0, 0x1f4) pread64(0xffffffffffffffff, 0x0, 0x0, 0x1000) setrlimit(0x0, &(0x7f0000000080)={0x2a56, 0x5b1e982e}) socket(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(0xffffffffffffffff, 0xc040563d, &(0x7f0000000000)={0x1, 0x0, 0x101, 0xf, {0x0, 0x2, 0xa1ea, 0x10000}}) [ 2265.303002][T28375] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2265.309891][T28375] Mount JFS Failure: -5 [ 2265.314282][T28375] jfs_mount failed w/return code = -5 08:12:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0x14, 0x2b, 0x0, 0x1, [@IFLA_XDP_FLAGS={0x8, 0x3, 0x3}, @IFLA_XDP_FD={0x8}]}, @IFLA_GROUP={0x8}]}, 0x3c}}, 0x0) [ 2265.393565][T28375] loop3: detected capacity change from 0 to 386 08:12:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="85"]) [ 2265.489399][T28375] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2265.489399][T28375] 08:12:28 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) bind(r0, &(0x7f0000000080)=@nfc_llcp={0x27, 0x0, 0x0, 0x5420c51d178e1c01, 0x0, 0x0, "4fb4065ebfb3e412c7d3d36dae613567f1a17f59cbe2dbd3272f5e0b813bda9456906cb4581256ed80881dbf3aed05585c8db396c4f92f1c1d999abce2d93a"}, 0x80) connect$pptp(r0, &(0x7f0000000100)={0x18, 0x2, {0x0, @broadcast}}, 0x1e) 08:12:28 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4008ae89, &(0x7f0000001a40)={"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"}) [ 2265.579589][T28375] ERROR: (device loop3): remounting filesystem as read-only [ 2265.667211][T28395] loop4: detected capacity change from 0 to 267 [ 2265.669451][T28375] xtLookup: xtSearch returned -5 [ 2265.678627][T28375] read_mapping_page failed! [ 2265.681467][T28395] BTRFS: device fsid f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 devid 1 transid 7 /dev/loop4 scanned by syz-executor.4 (28395) [ 2265.811599][T28395] BTRFS error (device loop4): unrecognized mount option '…' [ 2265.819415][T28375] jfs_mount: diMount(ipaimap) failed w/rc = -5 08:12:29 executing program 5: r0 = syz_open_dev$cec(&(0x7f0000000480), 0x2, 0x2) ioctl$VIDIOC_QUERYBUF(r0, 0x5460, 0x0) 08:12:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gtp={{0x8}, {0x14, 0x2, 0x0, 0x1, {{0x8, 0x4}, {0x8}}}}}]}, 0x40}}, 0x0) 08:12:29 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000140)={0x190, 0x78, 0x0, 0x190, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) [ 2265.855270][T28375] Mount JFS Failure: -5 [ 2265.871421][T28395] BTRFS error (device loop4): open_ctree failed [ 2265.895302][T28375] jfs_mount failed w/return code = -5 08:12:29 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46f5f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:29 executing program 1: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x4040, 0x0) 08:12:29 executing program 2: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000300)="dd01270d4e1cd7d94dbf6a9a6fa1a74e143cacf968d1d3e0fced31c82fd2193dddd04104f3f70550f1214fdfae2bf1094e92682284f17ba7e8806bdc5285f281c1492a7e158ce4b1c0d212618a59a78bd0c2678ffc8f370c6efdb18c48117b35d525e901a31fdcf138ac0e237be95170b734ce5c4438b9a323c05b6000fd5095", 0x80, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x406f408, 0x0) 08:12:29 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x30, r0, 0x1, 0x0, 0x0, {{}, {}, {0x14, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'nr0\x00'}}}}}, 0x30}}, 0x0) 08:12:29 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$rds(r0, &(0x7f0000000040), 0x10) 08:12:29 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x20000009}, 0x0) sched_setattr(0x0, &(0x7f0000000200)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1000, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x200000000011, r2, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="2ad64e75dc862951c4dd74ea2f342443b8f15269af7e7f4b5c716c80a3b2e4fc01e8ed739ff3336b5cd8757359bc69a3d5a377db24a22c4cf63d40b5ce62e441dd1ebf03d4ef13f853cb2c861188e039f89163f15bae004da8adccff5c53d46e19059f5a6df44f491edb7d7ae1493c84af5d000200004596a24533ffd3bad5d608b584242b3a451f0e50d31340fbb8c554105789862b60df74f9", @ANYRESHEX], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) r3 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240), 0x40, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000300), 0x440, 0x0) io_submit(0x0, 0x4, &(0x7f00000006c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x5, 0x3, r1, &(0x7f0000000100)="691fd89f7be2e35201958bc0b26a38c34e4d06a4901721fede7b7428834f7a9154a07aa86aa7a63ea8f7a8f65f0a9b3639a6ddcdfc8f", 0x36, 0xfffffffffffffffb}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x6, 0xb4f, 0xffffffffffffffff, &(0x7f00000003c0)="92b4ea1df82789e4363c454975b09bca89e659393132d2bcba07880ba48a57cd6298cba5dd812ed73e76ab3d44a90deac07df3d7c886a449924021d642b44676ce1ed5177113b455eb98f6684c3fee256209a3fede98c57420ac19561925c7565f3495796eb7901512650e1955751ccc897f8c7a98615eec3c54eac2cf6df466bc24d566a700cb46ee26481c1bd18088f32e203644e73e3b28359fea54302f27ea6f9746934348ef810e5dccbf1a323b82c832843550b248ceb16e63c8c5dedb6f97c6bb377eeeaf029cc0a9fa0b905ca056b997256df0e4a95db47bab27b90f68c8ede8a3228733a237ed40a0b736", 0xef, 0x800, 0x0, 0x3}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xe, 0xa04, r3, &(0x7f00000004c0)="e59664a81f009ab91e5b79ca550df532f8c4b0eef9d0603533bc9cf45ab134ea82435752b916b0a7d16956dd0f3e40362c312f3457764ceea9240b9415ab0420c2404ccd98fc336dcd0d404c7db21535f869ddf1da5725d6fd006f6c8b7eb9c070d7444c7ddbdb92029db3d1bc851a78b1d137987db42bfb5752c0be9ca2a7ccf2b565cae22c336df81655dcd8adbc9953072915fb361983e88789db7c2ec98cf1c215b1c581617eb29b3aee63764933e904454d24b372bae0e1b04c946dec28e797e8c02ca797192ede9f33575e6263810b2c1e3f66b5763ec5474ad20ecaef178345a40cf3f535f5f12eb2d4a3a4", 0xef, 0xfffffffffffffac5, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0xff, r1, 0x0, 0x0, 0x0, 0x0, 0x2, r4}]) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x0, 0x40, 0x8, 0x9}, 0x0) sendto$inet6(r0, &(0x7f0000000200)="03", 0x7ffff000, 0x40080, 0x0, 0x1f4) pread64(0xffffffffffffffff, 0x0, 0x0, 0x1000) socket(0x10, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(0xffffffffffffffff, 0xc040563d, &(0x7f0000000000)={0x1, 0x0, 0x0, 0xf, {0xfff, 0x2, 0xa1ea, 0x10000}}) 08:12:29 executing program 1: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040), 0x80643, 0x0) 08:12:29 executing program 0: syz_mount_image$pvfs2(0x0, 0x0, 0x0, 0x1, &(0x7f0000004c80)=[{0x0, 0x0, 0x1ff}], 0x0, 0x0) 08:12:29 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/keycreate\x00') fsmount(r0, 0x0, 0x0) [ 2266.205161][T28426] loop3: detected capacity change from 0 to 386 [ 2266.279354][T28426] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2266.279354][T28426] [ 2266.359745][T28426] ERROR: (device loop3): remounting filesystem as read-only [ 2266.396350][T28426] xtLookup: xtSearch returned -5 [ 2266.423265][T28426] read_mapping_page failed! [ 2266.436842][T28426] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2266.463369][T28426] Mount JFS Failure: -5 [ 2266.473261][T28426] jfs_mount failed w/return code = -5 [ 2266.549760][T28426] loop3: detected capacity change from 0 to 386 [ 2266.580098][T28426] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2266.580098][T28426] [ 2266.617612][T28426] ERROR: (device loop3): remounting filesystem as read-only [ 2266.649304][T28426] xtLookup: xtSearch returned -5 [ 2266.676534][T28426] read_mapping_page failed! [ 2266.695604][T28426] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2266.724076][T28426] Mount JFS Failure: -5 [ 2266.741832][T28426] jfs_mount failed w/return code = -5 08:12:30 executing program 5: sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="89cfdbcc", @ANYRES16=0x0, @ANYBLOB="010028bd7000ff4be91c29"], 0x70}}, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:12:30 executing program 2: r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141001) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) 08:12:30 executing program 1: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000001180)={0x12, 0x2, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000340), &(0x7f00000000c0)=@udp=r1}, 0x20) close(r1) 08:12:30 executing program 0: syz_mount_image$pvfs2(&(0x7f0000004940), &(0x7f0000004980)='./file0\x00', 0x0, 0x0, &(0x7f0000004c80), 0xc, &(0x7f0000004d00)) 08:12:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r2, 0xc080aebe, &(0x7f0000001a40)={"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"}) 08:12:30 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4705f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:30 executing program 4: unshare(0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000080eff95"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000100)=ANY=[], 0xbf) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) setxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = creat(0x0, 0x0) r4 = creat(&(0x7f0000000300)='./file0/file0\x00', 0x0) write$cgroup_type(r4, &(0x7f00000009c0), 0xd4ba0ff) pwritev(r4, &(0x7f00000008c0)=[{0x0}, {&(0x7f0000000580)="8353aa74e0aed67b1a616131028946347e1a9e019075fab87ca54c814c652bf5881b4c7b9c11722263368efc67e45e73c5413fd99b1a146c5fbf8f16ee04a5920c622896f9246a25426c85065b8645e59d5ae4d4c5358122fde8285cd2e565a9758f9c8d5c63f45a736c785e541f8725d12bc2cbe0535d214cda84e93cf23c00ab76c6d8abdd8be2be919896e519", 0x8e}, {&(0x7f0000000640)="84f0b0a077e111b97cbf3b916067e4796660345bfd7caa47cc786a203ede0f0673c7a53b76aac5d479ded74d1a56d4cc0377615574432e454742fc8e9f7b3062fc8a56684c06bfabf480ab018f8d473033a7eac2e17431d67d14aea9435e9e5edb94a9a1ab9447225dee336fe817701dcb4e3b5b4ba846e94f3435d234f195a83fcd9b186bb28c98bfcd1b2a007768870b02fd4b4b8a5ebcbc10388398466d52c433d0795f556231b995f350a910", 0xae}, {&(0x7f0000000700)="19d0879d6af8a2f912dff7b3bb519d3ae4bb49e0e8a99de864306f1f56d27a05b28ec28e7563fdafae3849b30496b7a9efb350bc0be9c7e2d8206b32b2722249bbf17d039212d7428167f2c5c9730da4f9c78e0e6cb6b43ec688c1b151a90f521812451b33377854e36991ab0e3e2727120a908d5c1c81b3ddf756eb45fb0c2c1651ae5206f17a808086b1a4148afa250c128ff1f888f2da56622a6ad1644bf5b8dc0a2968417c80718716bda95f9942fe8074638b", 0xb5}, {&(0x7f00000007c0)="b0802f07eaf897524328c7aefdf4025fc18155d20541d2ff018c8829c06584009361c996726a27e1320595fd74ac842075da9c1e4134ebdab676ddf92105791d1d423a0cdf7beb6c623561ee590dded6061740b6d505817101946d990f8c5bd9880f46dc", 0x64}], 0x5, 0x0, 0xff) write$cgroup_type(r3, &(0x7f00000009c0), 0xd4ba0ff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="06000000", @ANYRES32=r3, @ANYBLOB="00000000000000004849feff080000001032"], &(0x7f0000000100)='GPL\x00', 0x0, 0x68, &(0x7f0000000140)=""/104, 0x40e00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x0, 0x3, 0x2, 0x8}, 0x10}, 0x78) ioctl$KVM_GET_EMULATED_CPUID(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000380)=""/174) open_by_handle_at(r2, &(0x7f0000000280)=@nfs={0x90, 0x24, {0x2c, 0x0, 0x6, 0x80, "5936214d9d76f6bb9333e25ec07fc796f1f8b347ba994111016415ba9117f225cc590ce52a3a3518ce84316873fff1e06848b7f7d73ea51b3b490070348e09bcf8c32302eb3bacba97a722d6eb87e79cc00e694aa3007bb51919dc65310c91ff3ea047dc48d8f5a16fbb5700a40588b7404a8598955da9f467ecf07df24f06be"}}, 0x200000) 08:12:30 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000480), 0x2, 0x2) ioctl$VIDIOC_QUERYBUF(r0, 0x801c581f, 0x0) 08:12:30 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000005200), 0x2, 0x0) [ 2267.633098][T28456] loop3: detected capacity change from 0 to 386 08:12:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, 0x0) [ 2267.703796][T28456] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2267.703796][T28456] 08:12:31 executing program 1: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x68000400) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x2, 0x800) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) 08:12:31 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000480), 0x2, 0x2) ioctl$VIDIOC_QUERYBUF(r0, 0xc0506107, 0x0) [ 2267.794466][T28456] ERROR: (device loop3): remounting filesystem as read-only [ 2267.864279][T28456] xtLookup: xtSearch returned -5 [ 2267.874826][T28471] IPVS: ftp: loaded support on port[0] = 21 [ 2267.901809][T28456] read_mapping_page failed! [ 2267.924314][T28456] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2267.954373][T28456] Mount JFS Failure: -5 [ 2267.974647][T28456] jfs_mount failed w/return code = -5 [ 2268.043533][T28456] loop3: detected capacity change from 0 to 386 [ 2268.055643][T28456] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2268.055643][T28456] [ 2268.069120][T28456] ERROR: (device loop3): remounting filesystem as read-only [ 2268.080697][T28456] xtLookup: xtSearch returned -5 [ 2268.087470][T28456] read_mapping_page failed! [ 2268.096239][T28456] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2268.104656][T28456] Mount JFS Failure: -5 [ 2268.110524][T28456] jfs_mount failed w/return code = -5 08:12:31 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x3fffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:12:31 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000c40)) 08:12:31 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000040)=@abs={0x0, 0x0, 0x4e24}, 0x6e) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x30, r1, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}]}]}, 0x30}}, 0x0) 08:12:31 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) 08:12:31 executing program 1: sendmsg$RDMA_NLDEV_CMD_RES_GET(0xffffffffffffffff, 0x0, 0x0) openat$incfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000001780), &(0x7f00000017c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001cc0), 0x0, &(0x7f0000001d40)={[], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}]}) 08:12:31 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4735f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:31 executing program 1: getresuid(&(0x7f000000d440), &(0x7f000000d480), &(0x7f000000d4c0)) 08:12:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @lowpan={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 08:12:31 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x14, &(0x7f00000000c0)={0x0}, 0x10) 08:12:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$ARPT_SO_SET_REPLACE(r2, 0xa02000000000000, 0x60, &(0x7f0000000840)={'filter\x00', 0x1002, 0x4, 0x3d0, 0x1d8, 0x0, 0xe8, 0x2e8, 0x2e8, 0x2e8, 0x4, 0x0, {[{{@arp={@initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_vlan\x00', 'bond_slave_1\x00'}, 0xc0, 0xe8, 0x0, {0x0, 0x3}}, @unspec=@STANDARD={0x28, '\x00', 0x2, 0xfffffffffffffffb}}, {{@arp={@empty, @multicast2, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_to_team\x00', 'veth0_to_bridge\x00'}, 0xc0, 0xf0}, @unspec=@CONNMARK={0x30}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@dev, @empty, @local, @loopback}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x420) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="30000000100003"], 0x30}}, 0x0) [ 2268.618084][T28513] loop3: detected capacity change from 0 to 386 08:12:32 executing program 2: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000180)=@rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x1}, 0x80, 0x0}, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='bbr\x00', 0x4) sendto$inet6(r1, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x0) shutdown(r1, 0x1) splice(r1, 0x0, r0, 0x0, 0x406f408, 0x0) 08:12:32 executing program 2: syz_mount_image$efs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001680)) fork() [ 2268.723420][T28513] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2268.723420][T28513] [ 2268.871458][T28513] ERROR: (device loop3): remounting filesystem as read-only [ 2268.938168][T28513] xtLookup: xtSearch returned -5 [ 2268.974195][T28513] read_mapping_page failed! [ 2268.996039][T28513] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2269.023364][T28513] Mount JFS Failure: -5 [ 2269.036591][T28513] jfs_mount failed w/return code = -5 [ 2269.098718][T28513] loop3: detected capacity change from 0 to 386 [ 2269.115303][T28513] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2269.115303][T28513] [ 2269.129137][T28513] ERROR: (device loop3): remounting filesystem as read-only [ 2269.146923][T28513] xtLookup: xtSearch returned -5 08:12:32 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x20000009}, 0x0) sched_setattr(0x0, &(0x7f0000000200)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1000, 0x9, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x200000000011, r2, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001600)=ANY=[@ANYBLOB="2ad64e75dc862951c4dd74ea2f342443b8f15269af7e7f4b5c716c80a3b2e4fc01e8ed739ff3336b5cd8757359bc69a3d5a377db24a22c4cf63d40b5ce62e441dd1ebf03d4ef13f853cb2c861188e039f89163f15bae004da8adccff5c53d46e19059f5a6df44f491edb7d7ae1493c84af5d000200004596a24533ffd3bad5d608b584242b3a451f0e50d31340fbb8c554105789862b60df74f940f02278e50c5ac4afd11510904654b3ca6635bce9b8", @ANYRESHEX], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) r3 = socket$phonet(0x23, 0x2, 0x1) r4 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240), 0x40, 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000300), 0x440, 0x0) io_submit(0x0, 0x4, &(0x7f00000006c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x5, 0x3, r1, &(0x7f0000000100)="691fd89f7be2e35201958bc0b26a38c34e4d06a4901721fede7b7428834f7a9154a07aa86aa7a63ea8f7a8f65f0a9b3639a6ddcdfc8f", 0x36, 0xfffffffffffffffb}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x6, 0xb4f, r3, &(0x7f00000003c0)="92b4ea1df82789e4363c454975b09bca89e659393132d2bcba07880ba48a57cd6298cba5dd812ed73e76ab3d44a90deac07df3d7c886a449924021d642b44676ce1ed5177113b455eb98f6684c3fee256209a3fede98c57420ac19561925c7565f3495796eb7901512650e1955751ccc897f8c7a98615eec3c54eac2cf6df466bc24d566a700cb46ee26481c1bd18088f32e203644e73e3b28359fea54302f27ea6f9746934348ef810e5dccbf1a323b82c832843550b248ceb16e63c8c5dedb6f97c6bb377eeeaf029cc0a9fa0b905ca056b997256df0e4a95db47bab27b90f68c8ede8a3228733a237ed40a0b736", 0xef, 0x800, 0x0, 0x3}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xe, 0xa04, r4, &(0x7f00000004c0)="e59664a81f009ab91e5b79ca550df532f8c4b0eef9d0603533bc9cf45ab134ea82435752b916b0a7d16956dd0f3e40362c312f3457764ceea9240b9415ab0420c2404ccd98fc336dcd0d404c7db21535f869ddf1da5725d6fd006f6c8b7eb9c070d7444c7ddbdb92029db3d1bc851a78b1d137987db42bfb5752c0be9ca2a7ccf2b565cae22c336df81655dcd8adbc9953072915fb361983e88789db7c2ec98cf1c215b1c581617eb29b3aee63764933e904454d24b372bae0e1b04c946dec28e797e8c02ca797192ede9f33575e6263810b2c1e3f66b5763ec5474ad20ecaef178345a40cf3f535f5f12eb2d4a3a4", 0xef, 0xfffffffffffffac5, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0xff, r1, &(0x7f00000005c0)="e7d01b687d94f835709d7d78325bab60237d372d744ae09f95dd0eae9f52bfda0ac0138b69668a4809a9b0ac1739a002d1825b0bf1aa1a2b0bac43b97e9026bffff5765db5b961fc6e683d2245af40c4308f8fac5cbd9190317d9b931c1efc733fdaba743677167a9f1c046c17d8c169fd2b274bde3899bd487f5e256e314dca8822d394a4ae5c9505bf3c724baaea22", 0x90, 0x400, 0x0, 0x2, r5}]) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x0, 0x40, 0x8, 0x9}, 0x0) sendto$inet6(r0, &(0x7f0000000200)="03", 0x7ffff000, 0x40080, 0x0, 0x1f4) pread64(0xffffffffffffffff, 0x0, 0x0, 0x1000) socket(0x10, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(0xffffffffffffffff, 0xc040563d, &(0x7f0000000000)={0x1, 0x0, 0x101, 0xf, {0xfff, 0x2, 0xa1ea, 0x10000}}) 08:12:32 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x0, 0x6, &(0x7f0000000580)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @map={0x18, 0x5}, @alu={0x4, 0x0, 0x7, 0x8, 0xa, 0x0, 0xfffffffffffffff0}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}], &(0x7f0000000800)='GPL\x00', 0x1, 0xdf, &(0x7f0000000600)=""/223, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000740)={0x5, 0x6, 0xf3a, 0xffff}, 0x10}, 0x78) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r2 = dup(r0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000140)=""/93) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000100)={0x2, 0x0, 0x3}) statfs(&(0x7f0000000040)='./file1\x00', 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000003b00)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000003ac0)={&(0x7f0000000400)=ANY=[@ANYBLOB="f4000000eb359595fba7f73cd7bf40cee0fd5aa42ad9f3112aaea80c71127c1ab9f173ebf919c96ff93464fe23302842984690ce927cc28a9e5b05688c62d6d79fa99a925a7d279073374b749feb9aa45edcfc209a0000bb4590236c94561aa826eb23f57ed3d11505000000cad8fb1bb5caf1", @ANYRES16=0x0, @ANYBLOB="020025bd7000fddbdf2503000000050005007f000000540001800800", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="600194cfd1493808000000", @ANYRES32=0x0, @ANYBLOB="0800030003000000140002007866726d3000", @ANYRES32=0x0, @ANYBLOB="14000200776c616e30000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="140002006772657461703000000000000000000048000180140002006272696467655f736c6176655f31000008000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f3100001400020074756e6c3000"/40], 0xf4}, 0x1, 0x0, 0x0, 0x40043}, 0x4000840) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f00000003c0)=ANY=[], 0x9) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) 08:12:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) fcntl$addseals(r1, 0x409, 0x8) fremovexattr(r1, &(0x7f0000000100)=@known='system.posix_acl_default\x00') 08:12:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000000), &(0x7f0000000080)=0x44) 08:12:32 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) read$midi(r1, &(0x7f0000002040)=""/4097, 0x1001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x220fff) [ 2269.193653][T28513] read_mapping_page failed! [ 2269.198268][T28513] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2269.251403][T28513] Mount JFS Failure: -5 [ 2269.255867][T28513] jfs_mount failed w/return code = -5 08:12:32 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4755f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:32 executing program 4: socket$inet6(0xa, 0x0, 0x982b) 08:12:32 executing program 0: clone(0x180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x5, 0x0, 0x0, 0xf}]}}, &(0x7f0000000080)=""/259, 0x26, 0x103, 0x8}, 0x20) 08:12:32 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f00000028c0)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000002880)={&(0x7f0000000940)={0xec4, 0xd, 0xa, 0x301, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0xe5c, 0x3, 0x0, 0x1, [{0x50, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_USERDATA={0x49, 0x6, 0x1, 0x0, "2ff64cf794b9e92bb74bdcbe260c70aecfe4ce918452141dfb43cb6bca915b6783bb16c0f2f6b48258270f684b3995ffe1dc6c8d769cdba4902757e5e5934e4f42201a2545"}]}, {0x118, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_USERDATA={0xdd, 0x6, 0x1, 0x0, "dce2af644b3c4a8e4f7065fa40f3d17620a2dc04f155c7bce505ea7c33e81c7261018b9004fec5e4d46a6d3818dfdd26fd9fcfe6b52e72eb3498bd06819f39d46c12d250c6de9fe5d863a4571ffef1c325e8117c74c0de1f95cb46ad1c009007ed3b5961a2127bca0882c4f0d25683773f34cecb133f7c88ab796418bd961fee6cfaa241d5e81d45c6fd6f03964a5dd9d35124f17e86d684cab73e7968437001aa9577807e66066af30359af6bc5c87b13095c2a1fac9ca73940b4bcf2decd5c3df62870831e0e571fbdeb7599f07dcf5328f4129e78dd103e"}, @NFTA_SET_ELEM_USERDATA={0x15, 0x6, 0x1, 0x0, "a7d9515b0ed91c4e3c79e720e72f34b83a"}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_TIMEOUT={0xc}]}, {0x7a8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x110, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0xb9, 0x1, "ac4ab04b7a1311b7e0eb6cc4edf9eeac88caa7ed77549a27e6d3820183b0c35f7c41fc1cd59d89ca3d9fa951931fcba605a57433d672846c14204f6b585c9aa1e62ebd9be99e318378b73cca1d39f548890c3d44113d9250308aebb8e5ae7339efe19996a7340b7b46b929d121e2f4b048dced1bfa78134210395ac506159b7f1c933750ed424a46c3d877ef27e8510eb138dcb8de647779871225c13d7ba46e63ffc8dd8b2f7ce70b415a1b43ac4fe5a9f659c4a8"}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_DATA={0x2c, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x28, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}]}]}, @NFTA_SET_ELEM_USERDATA={0xc9, 0x6, 0x1, 0x0, "cb91c8e85ed4e06266ecc7e489ab140dd19a4099008d9a2d37fcb136bc58ca033f9886d227353ee68d7e9f0683de609372c4c77d47aa240eefc57d927bc7b3c2a8aaf7fa3bf0bb786fe848086bddba5e2531eb2d8380bd089ebc919619f01ad9c42f3e3bb02f45d54f56b12a248d51c0458ab6c0397c7f98b0d265b71a9546cb052cbd9dcb3b904359f02c39eacdf350f5e1bea5b31af5c40e37952efb66661c1fd9c578584089dddb9244a844afa97546af38e7e522522cebeba18bb7f417fd74d7277c30"}, @NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_USERDATA={0xf1, 0x6, 0x1, 0x0, "53b2c9272533c6de6106a4cc1cda08d0a27a98a3fd60094d70037c38ebf5d527f4ca52290adad5b86f659b8279133ebf6eabe120a8861c6ea4e323f637f12f9fdfd4e8ccb8e0cc485fc8b26ad07b8d2f23721cfd05992454f97e8c059523ebf5259b2b6f7ccf5d24bbc61abde64d618da6603674312afa51fa09eaff31c930a378cd63f522c96f0b70e136a7969174e98929568313dfc7628ed72cb304ca6dbc22d8b3aed550b03c8787d395d7064ad54f7cb74b3960edd1aba1f0733ec0fc587a3f979247679437239f5a8e524c793dc6735f4c355cafa62b17098a96d2da0d657dfd8df223e3652849cf8e1a"}, @NFTA_SET_ELEM_KEY={0x420, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0x79, 0x1, "0539a7678e22c6cba2f110764278173dbe833093538fe2c73bd61ea2ce6c4c38e0076768dde0684ee595d559bf7eaec92943ec11e3329bb6ea14bf9b44525403957752cb9576a33f7d08883b16b3408e3d5331ec6115eaf8133f102a9aa3b32413621dd1a21c56d0d6b21c412c2347602fefb89cb0"}, @NFTA_DATA_VERDICT={0x28, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0x101, 0x1, "61f1eb57eb5c295c920e68c3740405ce7dbae6f50f53e2f77efffb0998c8a5dde12eb62fe5a083ab754da58dc6225022da4b5aea36cf5c8d50670e20dfe567c738d06c2230bf90a28adeb2686d1be8834c0eb2dea0d85c2e08f366edf403ef907e07ecb5a55e498eef181fd13e0fa329202f6c75c5b8f5c709572c951c3d8f96fe0d0e6ee5d48b0ceb7f94e97ea5331e035a9453c882f306d9acd2ce96a62bf971b50ee82d8fba6f2bf1f4068406a169b1beb2b9e9286d66a23c4e1a77b9e45b592e39bd0390839c119f19780aa72f5cfe58f2f897e7a8f9e08cf1fa9c89e2e2a903f75b1e3be43427cd9a66996f3cd99fb00f330ff153290fefd678fa"}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0xcd, 0x1, "1b739c70895629a8f94d04a2b2a50faa5f5aa7b20479cd3fbcb0fea858f8b96bc044745f25e0a02f2e71afb6111acc023d284509733e77db8eeff0f4ee7e5a5258882d1c8fa76769e0379896f462ce3e034430e5f6dbd656ad56f5dd69327c6ca9aa3c391841fc6506d3c133461a2cd1e71cd463d118fe0e62f911c874c238312706f8dcf5a0a1c27418205beaa2a2ce6b40f8d1b1df3d074f4405fa0bdb11194cd57fb4cb5e77197fc731b577678bec81c9a0cbcb59bbb46e85c4438737c46735d261e6cd3ecf3a4b"}, @NFTA_DATA_VALUE={0xe9, 0x1, "2af6d525f8f4c312ecbb9d05b32c6b4586d64e6f5cb24a068ab8891050a59ea0e5dee4f7f6cd16e2161f3cf0d8846527f9374d5d39b5198e8fd4de690d7b517cab76b0eed1d4229e8566e7097285a3da7dc505091383fcd9c7fc088a1c3a7e3431df3445d42fb74d8d5a11b5720bb85a28846e65054ce09e02f3f5c36c38404868db10140da7637279003e73d591846ee9e5b3906b287be474784600447dd756df7999c668a80b85e6b828fb7fea98f317db65055bf7b177d014fa4bc0d1eb0fc7de550afe9408b0691c0feb68a98e83109f4260a0f85cd98d54a8242b0a7d8f128d747cd4"}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x4c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}]}]}, @NFTA_SET_ELEM_USERDATA={0x61, 0x6, 0x1, 0x0, "bfe1df473dc5a7142b18b7c0131172ad9ae75ae4169f6f8837f5a3c0a92295d7e96f192f18035a75d49af97c3c5b0a721f1597f1311da123666bd07849f7e898d7af0c073e67b86e1d3d11b8783754b4e5d865663eb6a1b0761bb3e483"}]}, {0x1c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}]}, {0x158, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY_END={0x20, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}]}, @NFTA_SET_ELEM_KEY={0xbc, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x48, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x19, 0x1, "c89633bc056f5700a8fc6f41ba3cbd056c53304586"}]}, @NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_KEY_END={0x50, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}]}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}]}, {0x3d4, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x15c, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x71, 0x1, "b1e65c924f4cf87ca4d5daee3f8773e5033e1596b867860147b2dc1a2b156a015877ee93a164110d5e83bfa32f99cbcac6103a739195d1ca3b883c0b5daa00608c85cb803e08e548899719c8d638296920907657bddf460b88df32c78178b62b43945fd14118604e58d0dbb3cd"}, @NFTA_DATA_VALUE={0x29, 0x1, "47f8938c5af2974b92d018b711649e15935508b981f32f91f0efb96d720d5654b45e3dc1a3"}, @NFTA_DATA_VERDICT={0x28, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x19, 0x1, "24a4d6ed74913c4bd9730dddc3af6d4a0a646c2160"}, @NFTA_DATA_VERDICT={0x54, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}]}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_KEY={0x264, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x24d, 0x1, "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"}]}]}]}]}, 0xec4}}, 0x0) 08:12:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)={[{@i_version}]}) 08:12:32 executing program 1: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0x4058534c, &(0x7f0000000640)) tkill(r0, 0x7) 08:12:32 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000480), 0x2, 0x2) ioctl$VIDIOC_QUERYBUF(r0, 0x80086601, 0x0) [ 2269.769102][T28557] loop3: detected capacity change from 0 to 386 [ 2269.841883][T28557] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2269.841883][T28557] [ 2269.876004][T28557] ERROR: (device loop3): remounting filesystem as read-only [ 2269.939339][T28557] xtLookup: xtSearch returned -5 [ 2269.944420][T28557] read_mapping_page failed! [ 2269.948966][T28557] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2269.993963][T28557] Mount JFS Failure: -5 [ 2269.998233][T28557] jfs_mount failed w/return code = -5 08:12:33 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = dup2(r3, r4) connect$unix(r3, &(0x7f0000000040)=@abs={0x0, 0x0, 0x4e24}, 0x6e) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x38, r7, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}]}]}, 0x38}}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000380)='mptcp_pm\x00') sendmsg$MPTCP_PM_CMD_GET_ADDR(r5, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="e7c1ff664eeb40706d24a7d949", @ANYRES16=r7, @ANYBLOB="20002d529cf27edbdf2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x4000011) 08:12:33 executing program 4: accept4$phonet_pipe(0xffffffffffffffff, 0x0, 0x0, 0x0) 08:12:33 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 08:12:33 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0xac, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:12:33 executing program 1: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000d00)={{0x12, 0x1, 0x0, 0x84, 0x3d, 0xb7, 0x10, 0x553, 0x202, 0x3207, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xbe, 0x38, 0x5b}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000001dc0)={0x2c, &(0x7f0000001c40)={0x0, 0x0, 0x2, "01cc"}, 0x0, 0x0, 0x0, 0x0}) [ 2270.114047][T28557] loop3: detected capacity change from 0 to 386 [ 2270.128714][T28557] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2270.128714][T28557] [ 2270.140804][T28557] ERROR: (device loop3): remounting filesystem as read-only [ 2270.149023][T28557] xtLookup: xtSearch returned -5 [ 2270.155279][T28557] read_mapping_page failed! [ 2270.160897][T28557] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2270.167767][T28557] Mount JFS Failure: -5 [ 2270.173558][T28557] jfs_mount failed w/return code = -5 08:12:33 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4785f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:33 executing program 0: openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080), 0x88800, 0x0) 08:12:33 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0xcb7}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 08:12:33 executing program 2: syz_mount_image$pvfs2(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ocfs2\x00', 0x0, 0x0) 08:12:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x15, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x114, 0x6, 0x0, 0x4) 08:12:33 executing program 0: futimesat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) 08:12:33 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) sendmsg(r0, &(0x7f0000001800)={&(0x7f0000000540)=@in6={0x1c, 0x1c, 0x3}, 0x1c, &(0x7f0000001600)=[{&(0x7f0000000580)="ee", 0x1}], 0x1, &(0x7f0000001640)=[{0x10}, {0x10}], 0x20}, 0x0) [ 2270.489503][ T6862] usb 2-1: new high-speed USB device number 76 using dummy_hcd [ 2270.699754][T28589] loop3: detected capacity change from 0 to 386 [ 2270.737761][T28589] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2270.737761][T28589] [ 2270.819396][ T6862] usb 2-1: Using ep0 maxpacket: 16 [ 2270.833826][T28589] ERROR: (device loop3): remounting filesystem as read-only [ 2270.881240][T28589] xtLookup: xtSearch returned -5 [ 2270.919450][T28589] read_mapping_page failed! [ 2270.924046][T28589] jfs_mount: diMount(ipaimap) failed w/rc = -5 08:12:34 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000580)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000080)="8e", 0x1}], 0x1}, 0x0) 08:12:34 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000d00)="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", 0x1000, 0x20104, &(0x7f0000000140)={0x10, 0x2}, 0x32) 08:12:34 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000140), &(0x7f0000000040)=0x90) 08:12:34 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001440)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000001400)=[@dstaddrv6={0x1c, 0x84, 0xa, @loopback}, @sndinfo={0x1c}], 0x38}, 0x0) [ 2270.967266][ T6862] usb 2-1: New USB device found, idVendor=0553, idProduct=0202, bcdDevice=32.07 [ 2270.979801][ T6862] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2270.979949][T28589] Mount JFS Failure: -5 [ 2271.002919][ T6862] usb 2-1: config 0 descriptor?? [ 2271.038212][T28589] jfs_mount failed w/return code = -5 [ 2271.052943][ T6862] gspca_main: stv0680-2.14.0 probing 0553:0202 [ 2271.122437][T28589] loop3: detected capacity change from 0 to 386 [ 2271.171078][T28589] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2271.171078][T28589] 08:12:34 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c) [ 2271.267910][T28589] ERROR: (device loop3): remounting filesystem as read-only [ 2271.311360][T28589] xtLookup: xtSearch returned -5 [ 2271.345318][T28589] read_mapping_page failed! [ 2271.379150][T28589] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2271.409993][T28589] Mount JFS Failure: -5 [ 2271.424308][T28589] jfs_mount failed w/return code = -5 08:12:34 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4885f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:34 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000280)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x188) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a}, 0xb) read(r0, &(0x7f0000002bc0)=""/4096, 0x1000) 08:12:34 executing program 4: r0 = socket(0x1c, 0x10000001, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000002500)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000140), 0x10) 08:12:34 executing program 0: r0 = socket(0x1c, 0x3, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x80043, 0x0, 0x0) 08:12:34 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_int(r0, 0x0, 0xb, 0x0, &(0x7f0000000100)) 08:12:35 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000300), &(0x7f00000003c0)=0x90) 08:12:35 executing program 2: r0 = socket(0x1c, 0x10000001, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000002500)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000002480)=[{&(0x7f00000000c0)='[', 0x1}], 0x1}, 0x0) shutdown(r0, 0x1) [ 2272.008973][T28635] loop3: detected capacity change from 0 to 386 [ 2272.097694][T28635] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2272.097694][T28635] [ 2272.138623][T28635] ERROR: (device loop3): remounting filesystem as read-only [ 2272.189453][ T6862] gspca_stv0680: usb_control_msg error 0, request = 0x88, error = -71 [ 2272.213747][T28635] xtLookup: xtSearch returned -5 [ 2272.218894][T28635] read_mapping_page failed! [ 2272.224000][ T6862] stv0680 2-1:0.0: STV(e): camera ping failed!! [ 2272.280019][ T6862] gspca_stv0680: usb_control_msg error 0, request = 0x80, error = -71 [ 2272.297846][T28635] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2272.329972][T28635] Mount JFS Failure: -5 [ 2272.336437][ T6862] stv0680 2-1:0.0: last error: 0, command = 0x0 [ 2272.352855][T28635] jfs_mount failed w/return code = -5 [ 2272.413993][ T6862] usb 2-1: USB disconnect, device number 76 [ 2272.440256][T28635] loop3: detected capacity change from 0 to 386 [ 2272.457376][T28635] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2272.457376][T28635] [ 2272.468470][T28635] ERROR: (device loop3): remounting filesystem as read-only [ 2272.478372][T28635] xtLookup: xtSearch returned -5 [ 2272.484721][T28635] read_mapping_page failed! [ 2272.494262][T28635] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2272.503323][T28635] Mount JFS Failure: -5 [ 2272.507568][T28635] jfs_mount failed w/return code = -5 08:12:35 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/230, 0xe6}, 0x0) 08:12:35 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x5, &(0x7f0000000040), &(0x7f0000000100)=0x4) 08:12:35 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = dup(r1) sendmsg$inet_sctp(r2, &(0x7f0000000680)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x22, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) 08:12:35 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 08:12:35 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000100)={0x0, 0x4630}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) 08:12:35 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4640a010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:36 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x3}, 0x1c) 08:12:36 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup2(r0, r0) bind$unix(r1, &(0x7f00000000c0)=@file={0xa}, 0xa) 08:12:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000540)={0x10, 0x2}, 0x10) 08:12:36 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect(r0, &(0x7f0000000040)=@un=@abs={0x8}, 0x8) 08:12:36 executing program 2: r0 = socket(0x2, 0x5, 0x0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000002580)=ANY=[@ANYRES32=0x0, @ANYBLOB="830c0fee"], 0x17) [ 2272.854142][T28659] loop3: detected capacity change from 0 to 386 [ 2272.871738][T28659] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2272.871738][T28659] [ 2272.915813][T28659] ERROR: (device loop3): remounting filesystem as read-only [ 2272.953736][T28659] xtLookup: xtSearch returned -5 08:12:36 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f0000000340)=[@init={0x14}, @dstaddrv6={0x1c, 0x84, 0xa, @local={0xfe, 0x80, '\x00', 0x0}}], 0x30}, 0x0) [ 2272.970966][T28659] read_mapping_page failed! [ 2272.986982][T28659] jfs_mount: diMount(ipaimap) failed w/rc = -5 08:12:36 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000180), 0xc) [ 2273.023664][T28659] Mount JFS Failure: -5 [ 2273.037759][T28659] jfs_mount failed w/return code = -5 [ 2273.131535][T28659] loop3: detected capacity change from 0 to 386 [ 2273.148038][T28659] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2273.148038][T28659] [ 2273.181414][T28659] ERROR: (device loop3): remounting filesystem as read-only [ 2273.245084][T28659] xtLookup: xtSearch returned -5 [ 2273.299303][T28659] read_mapping_page failed! [ 2273.304050][T28659] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2273.355713][T28659] Mount JFS Failure: -5 [ 2273.379139][T28659] jfs_mount failed w/return code = -5 08:12:36 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140), &(0x7f0000000200)=0x98) 08:12:36 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f00000000c0), 0x90) 08:12:36 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) sendto$inet(r2, &(0x7f0000000300)='=', 0x1, 0x0, &(0x7f0000000080)={0x10, 0x2}, 0x10) 08:12:36 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = socket(0x1c, 0x5, 0x0) dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000200)=ANY=[@ANYRES32=0x0], &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x1, &(0x7f0000000480)={r2}, &(0x7f0000000800)=0x10) 08:12:36 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000001f80)={0x10, 0x2}, 0x10) listen(r0, 0xe1) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x108, 0x0, 0x0) 08:12:36 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46425010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:36 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0xe8) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000340)="490dc72374bce4a6613bee732282dccb0df85773fbdd39eb99c8008000a83a7c8a523b8b42bef5f9e9c930eeca04d462457b84e350eaa3a92ec0b143b6df1077aaa601443e1ef460065f350bc3b06d3b36f20a6f22be7d6b545dc2ffecc1dcccbb1812f6068a5aa51e2d248d83e048ca882906f711f95ad686657537abaae679b4d6059b25586830e0a07521ac452b90a63f0395369ebac044e867d5afb681ae3ddb4911eba6975200699386a8bdca9d895cd87ab0d05b05605bec3ec93f4ca18be05dbf31c9011feff79445ae7db0b485deddc97eb159bb46404f47e27afae31ca706a57e33bb1ba1c9cb75ab58672e67a6e5c50b8f355ac8603d7e8e31c8c54bd60ee7fc54868bd4823eba3abdfa48cea4d34eb6b0ab2557117c3f3b63d7c20e1c7fe04ee433ec0b528c5ad353f41948d1ccd02dce324711689889ffa2c0f938f86bb096a0074a23a7ca1c2c21f74c549353df08bc49cd09aa10cdefd22943cd3eace98a61b5b22c93c601a703db7520ef22962de4c4773a41cc27db1592aa1b94eb3fd7648dff8036010c84ae534229b25e419772f221fd6a83896f89876846a4334ae3f2b6e262c1fd96e87be8f5df7c7ed5e74c5346fd84ca5a2299aa506324f7b8defb3b47dab98b58f9e078da89babe3ebf56020000b846f209c5607071052192d73ccfe6a50ef4fa882c6ff4cf03a2d0fcece6a21c3e82217001e8c3caa37b32fe6011911e3c823235d88755bc2a7959ea6ea11eb797660f614c90bff59a27fc763cd6582df19654c4785ec14ed10d28590f990301f30ef335350e87c0c61abbcc4e13146f31096ab4392cdc9ed4a5471374118f7529e87610a1a0b1c399a75d35ed179bfc4b4dfb33e67cdff99a4615dd02ca72aef02d962e1849d0108addf8760be60c122bd32e8c9560c2d730c57eeb4cf60b87237e", 0x29b}, {&(0x7f0000002c00)="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", 0xddd}], 0x2}, 0x0) 08:12:36 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) r1 = dup(r0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x18, &(0x7f0000000000), &(0x7f0000000040)=0x4) 08:12:36 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x28, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f00000001c0)=0x8) 08:12:37 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000340), 0x98) 08:12:37 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1400000084000000010000002000280d0900ff031000000084"], 0x58}, 0x100) 08:12:37 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000000)=ANY=[@ANYBLOB="01000500", @ANYRES32=0x0], &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x108, &(0x7f0000000440)={r3, 0x0, 0xcfe12dda5244b20}, &(0x7f0000000480)=0x18) [ 2273.806377][T28702] loop3: detected capacity change from 0 to 386 [ 2273.998155][T28702] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2273.998155][T28702] [ 2274.100444][T28702] ERROR: (device loop3): remounting filesystem as read-only [ 2274.146063][T28702] xtLookup: xtSearch returned -5 [ 2274.172151][T28702] read_mapping_page failed! [ 2274.176832][T28702] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2274.220649][T28702] Mount JFS Failure: -5 [ 2274.240710][T28702] jfs_mount failed w/return code = -5 [ 2274.311834][T28702] loop3: detected capacity change from 0 to 386 [ 2274.330936][T28702] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2274.330936][T28702] [ 2274.358638][T28702] ERROR: (device loop3): remounting filesystem as read-only [ 2274.396656][T28702] xtLookup: xtSearch returned -5 [ 2274.413501][T28702] read_mapping_page failed! [ 2274.435657][T28702] jfs_mount: diMount(ipaimap) failed w/rc = -5 08:12:37 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) recvfrom$inet(r0, 0x0, 0x0, 0x400c1, 0x0, 0x0) 08:12:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)=""/145, 0x91}], 0x1}, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvmsg(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/39, 0x27}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r2, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) recvmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000100)=""/43, 0x2b}, {0x0}, {0x0}], 0x3}, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r6, 0x0, 0xffffff1d, 0x0, 0x0, 0x800e00549) shutdown(r5, 0x0) recvfrom(r0, &(0x7f0000000480)=""/248, 0xf8, 0x0, 0x0, 0x0) shutdown(r6, 0x0) shutdown(r3, 0x0) 08:12:37 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) getsockname$inet6(r0, 0x0, &(0x7f0000000180)) 08:12:37 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000002080)={&(0x7f0000000680)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000380)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x2}, 0x1c, &(0x7f0000000180)=[{&(0x7f00000000c0)='d', 0x1}], 0x1, &(0x7f0000000300)=[@dstaddrv6={0x1c, 0x84, 0xa, @mcast1}, @prinfo={0x14}], 0x30}, 0x0) 08:12:37 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x1200, &(0x7f0000000340), &(0x7f0000000380)=0x8) [ 2274.445974][T28702] Mount JFS Failure: -5 [ 2274.451588][T28702] jfs_mount failed w/return code = -5 08:12:37 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4646f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:37 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) 08:12:37 executing program 1: mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000680)=""/112) fork() 08:12:37 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000180), &(0x7f0000000240)=0x88) 08:12:38 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000900)={&(0x7f0000000100)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0, 0x0, &(0x7f0000000840)=[@prinfo={0x14}], 0x14}, 0x0) 08:12:38 executing program 1: r0 = socket(0x2, 0x5, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000100)=0x7e) 08:12:38 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 2274.974956][T28742] loop3: detected capacity change from 0 to 386 [ 2274.993872][T28742] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2274.993872][T28742] [ 2275.004427][T28742] ERROR: (device loop3): remounting filesystem as read-only [ 2275.012343][T28742] xtLookup: xtSearch returned -5 [ 2275.017445][T28742] read_mapping_page failed! [ 2275.023844][T28742] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2275.037086][T28742] Mount JFS Failure: -5 [ 2275.047358][T28742] jfs_mount failed w/return code = -5 [ 2275.115542][T28742] loop3: detected capacity change from 0 to 386 [ 2275.147258][T28742] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2275.147258][T28742] 08:12:38 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$sock_int(r0, 0xffff, 0x1002, &(0x7f0000000040)=0x9, 0x4) 08:12:38 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r2 = socket$inet6_sctp(0x1c, 0x1, 0x84) r3 = dup2(r1, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = socket$inet6_sctp(0x1c, 0x1, 0x84) r6 = dup2(r4, r5) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x105, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x29, &(0x7f0000000040)={r7}, &(0x7f0000000080)=0x8) 08:12:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/232, 0xe8}], 0x1}, 0x0) readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000240)=""/204, 0xcc}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000140)=""/71, 0x47}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x973f, 0x0, 0x0, 0x800e0051f) shutdown(r1, 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) writev(r3, &(0x7f0000000040)=[{&(0x7f0000001c00)="b426652889b178ebce91f988753e32ee65525659197452117a5d2e962fc3608386fdb450862af17c3dcaf2915a4dd93bd6511cbc9c8eaba240e3552a13f588442d8d86f43f6698bab04a9dd0503a28ee335547ff56d057ee9bd5377565bf8d35f5dff40081979e93c4cbbe6a0c73313e0797c044a695f619908341e1988996ddd4c642f8320484605a4a2a081a9b907cc1d63fc29d83b86a44395d7a35288ca69487fc6b50518510c94174ef5838474a0d8747a8b8f4adfcecb58315a07b4cf827011a8fe65afa7a30a2527acde3cfee5907eb37cb922de747cf6acf7a5f375e5807d1145b6a7c", 0xfec0}], 0x3) shutdown(r2, 0x0) 08:12:38 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r0) 08:12:38 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x1203, &(0x7f00000000c0), &(0x7f0000000040)=0x8) [ 2275.199974][T28742] ERROR: (device loop3): remounting filesystem as read-only [ 2275.207331][T28742] xtLookup: xtSearch returned -5 [ 2275.283245][T28742] read_mapping_page failed! [ 2275.298759][T28742] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2275.318159][T28742] Mount JFS Failure: -5 [ 2275.335073][T28742] jfs_mount failed w/return code = -5 08:12:38 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46488010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:38 executing program 5: r0 = socket(0x1c, 0x5, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)=[@dstaddrv6={0x1c, 0x84, 0xa, @local={0xfe, 0x80, '\x00', 0x0}}], 0x1c}, 0x0) 08:12:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/30, 0x1e}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xffffff68, 0x0, 0x0, 0x800e00547) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/52, 0x34}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x80002) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x27c7, 0x0, 0x0, 0x800e0050e) shutdown(r2, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000002900)=[{&(0x7f0000000240)=""/205, 0xcd}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0xe}, 0x0) shutdown(r3, 0x0) 08:12:38 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x1a, &(0x7f0000000040), 0x8) 08:12:38 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000240)="9e", 0x1}], 0x1}, 0x0) 08:12:38 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind(r0, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 08:12:38 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000000), 0x88) 08:12:38 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x4d2}, 0x10) 08:12:38 executing program 0: syz_emit_ethernet(0x42, &(0x7f00000005c0)={@broadcast, @local, @val, {@ipv4}}, 0x0) 08:12:39 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind$inet6(r0, &(0x7f0000001700)={0x1c, 0x1c, 0x2}, 0x1c) [ 2275.769696][T28781] loop3: detected capacity change from 0 to 386 08:12:39 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f0000000000), &(0x7f00000000c0)=0x98) [ 2275.834295][T28781] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2275.834295][T28781] 08:12:39 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000500)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000000440)=[{&(0x7f0000000040)="e7", 0x1}], 0x1}, 0x0) [ 2275.949042][T28781] ERROR: (device loop3): remounting filesystem as read-only [ 2275.959125][T28781] xtLookup: xtSearch returned -5 [ 2276.045968][T28781] read_mapping_page failed! [ 2276.074715][T28781] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2276.121925][T28781] Mount JFS Failure: -5 [ 2276.150287][T28781] jfs_mount failed w/return code = -5 [ 2276.275413][T28781] loop3: detected capacity change from 0 to 386 [ 2276.308161][T28781] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2276.308161][T28781] [ 2276.318936][T28781] ERROR: (device loop3): remounting filesystem as read-only [ 2276.328258][T28781] xtLookup: xtSearch returned -5 [ 2276.334806][T28781] read_mapping_page failed! [ 2276.340656][T28781] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2276.347685][T28781] Mount JFS Failure: -5 [ 2276.353838][T28781] jfs_mount failed w/return code = -5 08:12:40 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f020000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) [ 2276.947032][T28807] loop3: detected capacity change from 0 to 386 [ 2276.981963][T28807] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2276.981963][T28807] 08:12:40 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="360000008400000004"], 0x71}, 0x0) 08:12:40 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)=@un=@file={0xa}, 0xa) 08:12:40 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) bind$inet(r1, &(0x7f0000000100)={0x10, 0x2}, 0x10) 08:12:40 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 08:12:40 executing program 0: symlinkat(&(0x7f0000000140)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') [ 2276.992305][T28807] ERROR: (device loop3): remounting filesystem as read-only [ 2277.001834][T28807] xtLookup: xtSearch returned -5 [ 2277.006834][T28807] read_mapping_page failed! [ 2277.014007][T28807] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2277.021087][T28807] Mount JFS Failure: -5 [ 2277.025555][T28807] jfs_mount failed w/return code = -5 [ 2277.101956][T28807] loop3: detected capacity change from 0 to 386 [ 2277.112136][T28807] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2277.112136][T28807] [ 2277.140487][T28807] ERROR: (device loop3): remounting filesystem as read-only [ 2277.148087][T28807] xtLookup: xtSearch returned -5 [ 2277.262534][T28807] read_mapping_page failed! 08:12:40 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @remote, @val, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @local, @rand_addr=0x5c, @broadcast}}}}, 0x0) [ 2277.322057][T28807] jfs_mount: diMount(ipaimap) failed w/rc = -5 08:12:40 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000002080)={&(0x7f0000000680)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x903, &(0x7f0000000140), 0x8) [ 2277.403582][T28807] Mount JFS Failure: -5 08:12:40 executing program 0: r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r0, &(0x7f0000000100)='./file1\x00') open$dir(&(0x7f00000000c0)='./file1\x00', 0x0, 0x0) [ 2277.437828][T28807] jfs_mount failed w/return code = -5 08:12:40 executing program 1: mlock(&(0x7f0000a00000/0x600000)=nil, 0x600000) mprotect(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x4) mprotect(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x3) 08:12:40 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f030000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:40 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) r2 = dup(r0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x901, &(0x7f0000000040), 0x8) 08:12:41 executing program 0: r0 = socket(0x2, 0x10000001, 0x84) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x900, &(0x7f0000000040), &(0x7f00000000c0)=0x8) [ 2277.855514][T28837] loop3: detected capacity change from 0 to 386 08:12:41 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) r4 = dup2(r2, r3) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x105, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x21, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r5}, &(0x7f0000000140)=0x10) 08:12:41 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = fcntl$dupfd(r1, 0x0, r1) connect$inet6(r2, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) r3 = fcntl$dupfd(r1, 0x0, r1) r4 = dup2(r3, r0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0x24, &(0x7f0000000500), &(0x7f0000000100)=0x98) 08:12:41 executing program 1: r0 = msgget(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x1800) 08:12:41 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x19, &(0x7f00000000c0), &(0x7f0000000100)=0x8) 08:12:41 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_buf(r0, 0x29, 0x33, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000100)='\b', 0x1, 0x0, &(0x7f0000000040)={0x1c, 0x1c, 0x2}, 0x1c) 08:12:41 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_int(r0, 0x29, 0xb, 0x0, 0x0) 08:12:41 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f0000000040)=0x8) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = socket$inet6_sctp(0x1c, 0x5, 0x84) r5 = dup2(r3, r4) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x105, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x19, &(0x7f0000000140), 0x8) [ 2278.032096][T28837] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2278.032096][T28837] 08:12:41 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto(r0, &(0x7f00000000c0)="97", 0x1, 0x0, &(0x7f0000000180)=@in6={0x1c, 0x1c, 0x1}, 0x1c) [ 2278.108113][T28837] ERROR: (device loop3): remounting filesystem as read-only 08:12:41 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000000), &(0x7f00000000c0)=0x88) [ 2278.199603][T28837] xtLookup: xtSearch returned -5 [ 2278.205439][T28837] read_mapping_page failed! [ 2278.218148][T28837] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2278.244938][T28837] Mount JFS Failure: -5 [ 2278.269631][T28837] jfs_mount failed w/return code = -5 [ 2278.322199][T28837] loop3: detected capacity change from 0 to 386 [ 2278.353999][T28837] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2278.353999][T28837] [ 2278.367857][T28837] ERROR: (device loop3): remounting filesystem as read-only [ 2278.379785][T28837] xtLookup: xtSearch returned -5 [ 2278.387547][T28837] read_mapping_page failed! [ 2278.399078][T28837] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2278.411451][T28837] Mount JFS Failure: -5 [ 2278.417945][T28837] jfs_mount failed w/return code = -5 08:12:41 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f040000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:41 executing program 1: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendto$inet6(r0, &(0x7f0000000200)="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", 0xfbe, 0x0, &(0x7f0000001200)={0x1c, 0x1c, 0x2}, 0x1c) 08:12:41 executing program 4: select(0x40, &(0x7f0000000000)={0x2}, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x6}) [ 2278.710452][T28886] loop3: detected capacity change from 0 to 386 [ 2278.763796][T28886] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2278.763796][T28886] [ 2278.830226][T28886] ERROR: (device loop3): remounting filesystem as read-only [ 2278.909626][T28886] xtLookup: xtSearch returned -5 [ 2278.924779][T28886] read_mapping_page failed! [ 2278.938904][T28886] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2278.956613][T28886] Mount JFS Failure: -5 [ 2278.962815][T28886] jfs_mount failed w/return code = -5 08:12:42 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x28, &(0x7f00000003c0)=ANY=[@ANYBLOB="01"], &(0x7f0000000080)=0x8) 08:12:42 executing program 2: r0 = socket(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)=[{0x10}], 0x10}, 0x0) 08:12:42 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x4, &(0x7f0000000040), 0x4) 08:12:42 executing program 4: r0 = socket$inet_sctp(0x2, 0x3, 0x84) setsockopt$inet_mreqsrc(r0, 0x0, 0xf, 0x0, 0x0) 08:12:42 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) bind$inet(r1, &(0x7f0000000040)={0x10, 0x2}, 0x10) 08:12:42 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f050000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:42 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) readv(r1, &(0x7f00000000c0)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x400c2) 08:12:42 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1003, &(0x7f0000000000)=0x1ff, 0x4) 08:12:42 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2279.197641][T28901] loop3: detected capacity change from 0 to 386 [ 2279.227762][T28901] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2279.227762][T28901] [ 2279.240822][T28901] ERROR: (device loop3): remounting filesystem as read-only [ 2279.248922][T28901] xtLookup: xtSearch returned -5 [ 2279.255446][T28901] read_mapping_page failed! [ 2279.261483][T28901] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2279.269170][T28901] Mount JFS Failure: -5 [ 2279.275483][T28901] jfs_mount failed w/return code = -5 08:12:42 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000000)={0x0, @in, 0xd, 0x0, 0x201}, 0x98) 08:12:42 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000000100)={&(0x7f00000000c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) getsockname(r0, 0x0, &(0x7f0000000180)) 08:12:42 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000040)={0xc2, 0x0, 0xae}, 0x8) [ 2279.388999][T28901] loop3: detected capacity change from 0 to 386 [ 2279.448498][T28901] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2279.448498][T28901] [ 2279.570626][T28901] ERROR: (device loop3): remounting filesystem as read-only [ 2279.659719][T28901] xtLookup: xtSearch returned -5 [ 2279.678858][T28901] read_mapping_page failed! [ 2279.700369][T28901] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2279.721621][T28901] Mount JFS Failure: -5 [ 2279.737671][T28901] jfs_mount failed w/return code = -5 08:12:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000001540)={0x10, 0x2}, 0x10) 08:12:43 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000040), 0x90) 08:12:43 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f00000000c0)={0x0, @in, 0x0, 0x0, 0x201}, 0x98) 08:12:43 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) 08:12:43 executing program 2: syz_extract_tcp_res(&(0x7f0000000000), 0x8, 0x8) r0 = shmget$private(0x0, 0x3000, 0xa0, &(0x7f0000ffc000/0x3000)=nil) shmat(r0, &(0x7f0000ffd000/0x1000)=nil, 0x1000) 08:12:43 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f060000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:43 executing program 2: r0 = socket(0x1c, 0x10000001, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000100), &(0x7f00000001c0)=0x90) 08:12:43 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r1 = dup2(r0, r0) sendto$inet(r1, &(0x7f0000000100)='N', 0x1, 0x0, &(0x7f0000000080)={0x10, 0x2}, 0x10) 08:12:43 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x1c, 0x1c}, 0x1c) 08:12:43 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000000)={0x0, 0x6}, 0x8) [ 2280.139964][T28944] loop3: detected capacity change from 0 to 386 [ 2280.226939][T28944] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2280.226939][T28944] [ 2280.243450][T28944] ERROR: (device loop3): remounting filesystem as read-only [ 2280.253962][T28944] xtLookup: xtSearch returned -5 [ 2280.268904][T28944] read_mapping_page failed! [ 2280.285159][T28944] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2280.305160][T28944] Mount JFS Failure: -5 [ 2280.327062][T28944] jfs_mount failed w/return code = -5 08:12:43 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000001f80)={0x10, 0x2}, 0x10) listen(r0, 0xe1) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f00000000c0)="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", 0x5ad}], 0x1}, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000040), 0x8c) 08:12:43 executing program 2: r0 = socket(0x1c, 0x10000001, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f00000003c0)=[{&(0x7f0000000140)="f0", 0x1}], 0x1, &(0x7f0000000400)=[@init={0x14}], 0x14}, 0x0) [ 2280.455570][T28944] loop3: detected capacity change from 0 to 386 08:12:44 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7f}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0xb) 08:12:44 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001300)={&(0x7f00000000c0)=@in6={0x1c, 0x1c}, 0x1c, 0x0}, 0x60108) 08:12:44 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x14) 08:12:44 executing program 2: r0 = socket(0x2, 0x5, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000740), &(0x7f0000000800)=0x90) 08:12:44 executing program 0: syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @empty, @val, {@ipv6}}, 0x0) 08:12:44 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f070000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000004c0)=""/4081, 0xff1}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xffffff68, 0x0, 0x0, 0x800e00547) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000000)=""/29, 0x1d}], 0x1}, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xfec5, 0x0, 0x0, 0x800e00505) shutdown(r3, 0x0) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000000c0)=""/184, 0xb8}, {0x0}], 0x2}, 0x40002) shutdown(r4, 0x0) 08:12:44 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x22, &(0x7f00000001c0), &(0x7f0000000240)=0xc) [ 2281.033720][T28977] loop3: detected capacity change from 0 to 386 08:12:44 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x3, 0x22}, 0x10) 08:12:44 executing program 1: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendto$inet6(r0, &(0x7f0000000000)="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", 0xfb5, 0x184, &(0x7f0000001000)={0x1c, 0x1c, 0x2}, 0x1c) 08:12:44 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000001f80)={0x10, 0x2}, 0x10) listen(r0, 0xe1) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x901, &(0x7f0000000040)={0x0, 0x81, 0x1, [0x0]}, 0xa) [ 2281.126629][T28977] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2281.126629][T28977] [ 2281.181710][T28977] ERROR: (device loop3): remounting filesystem as read-only [ 2281.202843][T28977] xtLookup: xtSearch returned -5 [ 2281.210405][T28977] read_mapping_page failed! [ 2281.215680][T28977] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2281.225909][T28977] Mount JFS Failure: -5 [ 2281.231633][T28977] jfs_mount failed w/return code = -5 08:12:44 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r0, &(0x7f0000000500)="3bef2e19cbd3c32cc7444eb435405c692c4aff227e36806956aca0651781a1cc26517ac682ee14d90bf2f20b0c039318f921cbb8f86922cc411da5069647f61a58098f69ee4a162c53df1647a6c28fb164c3bab9e26d99617229fc5204a3f77a30efc029dd9e5364483e60e02ad04a391c1b9cf554a664cd1f3542beaf19496934fc69f1b85c8b", 0x87, 0x0, &(0x7f0000000000)={0x10, 0x2}, 0x10) [ 2281.302768][T28977] loop3: detected capacity change from 0 to 386 [ 2281.340149][T28977] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2281.340149][T28977] [ 2281.429827][T28977] ERROR: (device loop3): remounting filesystem as read-only [ 2281.447237][T28977] xtLookup: xtSearch returned -5 [ 2281.458551][T28977] read_mapping_page failed! [ 2281.468512][T28977] jfs_mount: diMount(ipaimap) failed w/rc = -5 08:12:44 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000002080)={&(0x7f0000000680)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x22, &(0x7f00000001c0)={0x0, 0x4}, 0xc) sendmsg$inet_sctp(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000040)="c1", 0x1}], 0x1}, 0x0) 08:12:44 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x103, &(0x7f0000000000)={0x0, 0x2, "ade6"}, &(0x7f0000000080)=0xa) 08:12:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000a40)=""/4070, 0xfe6}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x1014a, 0x0, 0x0, 0x800e00515) r2 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r2, &(0x7f0000000240)={&(0x7f0000000280)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r3, &(0x7f00000004c0)=[{&(0x7f0000000580)=""/141, 0x8d}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0xa) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) shutdown(r3, 0x0) shutdown(r4, 0x0) 08:12:44 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f00000002c0), &(0x7f00000001c0)=0x2b) [ 2281.479632][T28977] Mount JFS Failure: -5 [ 2281.485131][T28977] jfs_mount failed w/return code = -5 08:12:44 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000100), 0x4) 08:12:45 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f080000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:45 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) 08:12:45 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x82) 08:12:45 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f00000002c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="dfff00ba"], 0x8) 08:12:45 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f00000001c0)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000980), 0xc) 08:12:45 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f00000003c0)=ANY=[@ANYBLOB="1c1c4e2300000000fe8000000000000000000000000000bb00"/128, @ANYRES32=0x0, @ANYBLOB="00000000ff0f000090b764b5"], 0x98) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x100) 08:12:45 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) r3 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r3, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r4 = socket$inet6_sctp(0x1c, 0x5, 0x84) r5 = dup2(r3, r4) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x105, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x21, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, r6}, 0x10) [ 2282.193872][T29026] loop3: detected capacity change from 0 to 386 [ 2282.232914][T29026] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2282.232914][T29026] [ 2282.243396][T29026] ERROR: (device loop3): remounting filesystem as read-only [ 2282.252107][T29026] xtLookup: xtSearch returned -5 [ 2282.257437][T29026] read_mapping_page failed! [ 2282.262963][T29026] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2282.270075][T29026] Mount JFS Failure: -5 [ 2282.274522][T29026] jfs_mount failed w/return code = -5 [ 2282.336266][T29026] loop3: detected capacity change from 0 to 386 [ 2282.355425][T29026] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2282.355425][T29026] [ 2282.370509][T29026] ERROR: (device loop3): remounting filesystem as read-only [ 2282.379168][T29026] xtLookup: xtSearch returned -5 [ 2282.386533][T29026] read_mapping_page failed! [ 2282.394387][T29026] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2282.403103][T29026] Mount JFS Failure: -5 [ 2282.407789][T29026] jfs_mount failed w/return code = -5 08:12:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in={0x10, 0x2}, 0x10) 08:12:45 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x14, &(0x7f0000000000)=ANY=[@ANYBLOB="030003"], 0x18) 08:12:45 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000002380)=[{&(0x7f0000000080)='b', 0x1}], 0x1, 0x0, 0x48}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000880)="e8", 0x1}], 0x1}, 0x109) 08:12:45 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=[@init={0x14}, @dstaddrv4={0x10, 0x84, 0x9, @multicast2}], 0x24}, 0x0) 08:12:45 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) 08:12:45 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f090000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:46 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0xe8) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000340)="8d1757ed354209f05a5397e1d9c5d7d75e7660d495fe760fbefb289e1d51a3b86c1558079f1e74ad23b190102ea3464a5706eb49bb645efdcecc26436e52505047ea6b7eecb784d14156e7b5bf0b3dda658401257bbca7f53527827adfdc690cc3096fe5af9086eb49cdc811651e67b3231fc53eb84dfc1d65bd2ac0e1a20ff2dd8d6b03bd19f25274dce5de5749228bdccfab70be980635ac5639f652eb7a7a623b743a79a78ebbb93d15158f0d", 0xae}, {&(0x7f0000000400)="9e2f486ef4187f7b5605f36f9536644a028d8179a035736bc6567c992d967af3222e66bb1056e8ed500980aa5e13193eb32e7077a27e14520bcbc658355117d160340dc8f14a6861a489d15d93598e6debc7119dbf13aa76fbcf524b95b0b7a978014d445e473fa34fc36003377789ce1fa06f08a6c6e92f18789a228e73c930ac22504bb43969523a35edd96702d9d733f75255426cc79b27fc41d755ec48508fbe6b0d913103966de7aaf3c1897bf9ed40dca0a39a4cae74d1b0742ba384a1b7c898fbb805c2f00c9d3a80a31d285310b1ea8644c99a477063d6db36f7cdb952d89c4afdc3660e", 0xe8}, {&(0x7f0000000080)="e57292c5cc2877e64f8144309763a11512c62b69568bb18967951a14d29825aa273a2625dfdc4c2f38cbc2ee8314593a070533fc1a23463ea3a70c7ec7ececc97605b46222c050283c3546a04138f5dedeed56757a3c2e88", 0x58}, {&(0x7f0000001180)="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", 0x397}], 0x4}, 0x0) [ 2282.755161][T29043] loop3: detected capacity change from 0 to 386 [ 2282.794303][T29043] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2282.794303][T29043] 08:12:46 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) sendto(r0, &(0x7f00000000c0)='!', 0x1, 0x0, &(0x7f0000000140)=@in={0x10, 0x2}, 0x10) 08:12:46 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x901, &(0x7f0000001780), 0x8) 08:12:46 executing program 4: r0 = socket(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x104, &(0x7f0000000100), &(0x7f0000000080)=0x4) [ 2282.901974][T29043] ERROR: (device loop3): remounting filesystem as read-only 08:12:46 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) bind$inet(r1, &(0x7f0000000140)={0x10, 0x2}, 0x10) [ 2282.975836][T29043] xtLookup: xtSearch returned -5 [ 2283.002427][T29043] read_mapping_page failed! 08:12:46 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0xe8) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) r2 = dup2(r1, r1) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x9, &(0x7f0000000040)=0x6, 0x4) sendmsg$inet_sctp(r2, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) [ 2283.024374][T29043] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2283.063696][T29043] Mount JFS Failure: -5 [ 2283.085769][T29043] jfs_mount failed w/return code = -5 [ 2283.183420][T29043] loop3: detected capacity change from 0 to 386 [ 2283.221043][T29043] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2283.221043][T29043] [ 2283.282379][T29043] ERROR: (device loop3): remounting filesystem as read-only [ 2283.337288][T29043] xtLookup: xtSearch returned -5 [ 2283.356254][T29043] read_mapping_page failed! [ 2283.380279][T29043] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2283.387786][T29043] Mount JFS Failure: -5 [ 2283.395581][T29043] jfs_mount failed w/return code = -5 08:12:46 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x12, &(0x7f0000000040)={0x1}, 0x1) 08:12:46 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) r1 = dup(r0) r2 = dup2(r0, r1) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x1d, &(0x7f0000000080), 0x8) 08:12:46 executing program 4: syz_emit_ethernet(0x52, &(0x7f0000000040)={@local, @remote, @val, {@ipv6}}, 0x0) 08:12:46 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f0000000040)=0x8) r4 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r4, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) r6 = dup2(r4, r5) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r6, 0x84, 0x903, &(0x7f0000000240)={r3}, 0x8) 08:12:46 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x103, &(0x7f0000000040)={0x0, 0x2, 'w3'}, &(0x7f00000000c0)=0xa) 08:12:46 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f0a0000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:47 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xc, &(0x7f0000000100), &(0x7f0000000140)=0xb) 08:12:47 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x5, 0x8000, 0x2}, 0x10) 08:12:47 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xc, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x7f}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0xb) [ 2283.755680][ T3226] ieee802154 phy0 wpan0: encryption failed: -22 [ 2283.763287][ T3226] ieee802154 phy1 wpan1: encryption failed: -22 08:12:47 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@broadcast, @remote, @val, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @empty, @empty, @remote}}}}, 0x0) [ 2283.826419][T29086] loop3: detected capacity change from 0 to 386 08:12:47 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x24, &(0x7f0000000200)=ANY=[@ANYBLOB="1c1c"], &(0x7f0000000000)=0x98) 08:12:47 executing program 4: r0 = socket(0x1c, 0x10000001, 0x84) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f0000000180), 0x8) [ 2283.985565][T29086] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2283.985565][T29086] [ 2284.004585][T29086] ERROR: (device loop3): remounting filesystem as read-only [ 2284.036562][T29086] xtLookup: xtSearch returned -5 [ 2284.056657][T29086] read_mapping_page failed! [ 2284.077117][T29086] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2284.101875][T29086] Mount JFS Failure: -5 [ 2284.117101][T29086] jfs_mount failed w/return code = -5 [ 2284.192558][T29086] loop3: detected capacity change from 0 to 386 [ 2284.204220][T29086] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2284.204220][T29086] [ 2284.216882][T29086] ERROR: (device loop3): remounting filesystem as read-only [ 2284.239474][T29086] xtLookup: xtSearch returned -5 [ 2284.247859][T29086] read_mapping_page failed! [ 2284.272187][T29086] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2284.292981][T29086] Mount JFS Failure: -5 [ 2284.304558][T29086] jfs_mount failed w/return code = -5 08:12:47 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x107, &(0x7f0000001e80), &(0x7f0000001ec0)=0x18) 08:12:47 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000080), 0x90) 08:12:47 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f00000016c0), 0x4) 08:12:47 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f00000004c0), &(0x7f0000000580)=0x98) 08:12:47 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000003680)={&(0x7f00000000c0)=@in={0x10, 0x2}, 0x10, &(0x7f0000003600)=[{&(0x7f00000003c0)="68745a74208f171976c93404ddad29809bc17383efd804f14e50d040b0ae073afbf9ac5efb30446b30bca0114904a9c4cd338f6009cf809308e08635f2ce32ca1af820e42fda724a3554f44734b2e59593eac5a9d8e983739c59f7338fd3ab1a45faeb03734c2ed99a86f018b46479faa7c78cc1c52aa1ac8b3d1a61727cc76e38ab136e9e62ce435f3971eefd32890ead0eacc3d4c549f1705ae551f925912f28f19ee3464c858db66a36d0c30c6bcf73701a3d257a9e07bd819678a4311f", 0xbf}, {&(0x7f0000000480)="7de57e2aef5b18a0009eff2dcaa1eb70a9c9b40638aaff8837d3a8f68e31a08110aef06c5e64733ea1c45f097806104365f00c07d517761ca155d50425f48edb0ca47d82d44c8ccd32d4eaa6dcbdf6d1b5530a722c412b319444d756fd87aeaad23f2f95e266e3c77325ee73e8523bd6b07eb50a73115dc5cf97f595ba0a63345485d2495f68735c33393eff941b691cadc6a7eb5455461eb2ab5e7c67b3ce81464a9cde9991db4ad16c90ff54bda75a8800ed5ef3068c74f0a1948f7de10a0dc63e1abcb182257741f5f3325724eb461d974bcfcf", 0xd5}, {&(0x7f0000000580)="14038bb2367ab92eb1fae1f0363e077a753ee0ca7ef835c28033bc56d73aadabed6a6ccf87ddada62080d9273af37905383e9181a5a8aade7cc42aa3f6c57e5a9a574d768a78c81c8bcc22f80c1eda42b5ff3ec062d0321481cdde7d65147a2ad6f1f7e87f6d9e872f1a6df242cb7f2969dac30290d2536341976e3d", 0x7c}, {&(0x7f0000000600)="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", 0x1000}, {&(0x7f0000000100)="ff0ae9fef909ec7864f044c2f49a8616ab7e13c6b49ad962542e6a0010eb2d05798e4e3cf81efd627b0f8eb6167ad11e41da765c79cd84a7be59f6ffc43cf934", 0x40}, {&(0x7f0000001600)="90fe2c072915b301226e3dc8c9bda902e36cde0c16bb7755c317076ad7de6a664867be70d8084898324a1f5ac1216df7e0e93f50b926cdd4e42e01e85af1373044cca60408a4ea7288d7bdcbceced6cb8befb5afe224563169292cc39f416a1f1f237ffce75bede0f1b429959212f247ee517bcd515ae61ddc4867324e6efc4032da46c69c704ddf848708b7ea8c5e7ecbf7cafbeb15152a540851040af190362b0e224b01a4ce3c91845fde4e39bdc72d46d7672fc606796ee990883ac61b4bd7790d36ce95eaae847c740ac70d791fb24abc1daa6d30e8e3ed155b1d9f19bd167d036068a6df1d422fb3292cf28bf79b343a5bf9c9f2bd9d835a89c106a718ffcf00edc69320bc19319a8395b30035124a5cfd43d040ed0bae08a704180bf64692429fe075797ecfedbf64161b7249b4005ec570fda61b46bcc7e28197ba44ed009d2a04b757f8f96c5f5867914f16f8b85ff2b6b03f574a6bd963a68a8a2a4e1a2e0fcc3de40e4bd025ef6c77080cdc479d4c338a7d5fcc62f6bbec52fe9a1d88d1345966e4be5ec4e66a148e618d8eb79d269480d085b0de49ad287453b4249078e15a72db4ce30c36968bf8e79e5e7bb2e8a5279032db0ff9587bfd8e5840868047124c40b511301c2e35881d8db43c062b38197d455ffc5ace3cb5e1b0f84134d8435c2a8cc1d47455c61e936decd5d89f8f61ed7f2519ccf0b56f95d39c161c42f338c9d6b2d6201c885c783314805619697e52d75d06d4db83a09cfe2e1b37d462341502e2a6341e53822cd1abe06ba5f40ee0798eba1ac5dea469af42d2fdc141808c5d32c08ee6245c0d17bebb8445e95dad56bd36659416c758df1524c089076ab261c58834a2204f8d6d972d2645cb4493a725523bfdced6dd50739bb775547b22afa9ecbdb8dd5a4adf845dd88b5a273bc9ec5fac405b4cbea65935bba5cb7ef2595d6ea9187cff3fdea3da3f5b06b1a344750fd0d5d8f51807c1dd789943920782e604a48c6b6e447daabc54d1a1f8691dfd79626a9d31c95068fb03a29b86f801cc68b4455a9a33ada8c33c20ee58877e9413d97e465755be7b0e21da445d9e7e0484f81a2a7336c219737d4b09f9b138c0435e5be3a4a750ad21b725af542dd754d1109ce8fcbf4e49eb39e241931df9f0f70252be6d40424eae41d34bd42b22a942e347b76a9c05e37d2df78a333e29e08c4a4fedcb740de6bea94bd80919c78757b9fb4716fc6a2a7122045a4758bd10cd2f38bb2b45d300dacd06ba44c26295e4b7511840209150d2612873fb97696c71ce3f4f979f37df2288dc42b22035354bb814d2aa63b75eb92772560ad53cc436d14fa2062a8ef8d1ea0c99ebc0ef159bff3c4de002f44e5f29ac24c0f1d4e5dcc091df6a0962057bf0ae3886b7c7e1e4e377f9febe5707052297236c0ba9df1615ddb9ad4f583d20a59792c9a56a8bcba964762ef5b33a2df6c602d58f798efedc7417b8cb77499aba8f9849afc368dc7293e400315c8db34df03e2d9a8dd4aea04d52c9adb78f7dc47c3f6c1fdfcd644cc97151da2c18274ed0353854503c763299b64c3d381b00bf2030530af00001a8d3ac65ff898d3cd813c92be177cd5c333d9be3152a86624584396f4a3a6445ec83bae7fdf1b46b7fc2159abe511cafaa95f682f062644e93a2a90058c92afa58f39b5dae5df36467713aef08de6b9bdfcfdb2a8a78db1f432edd086c9bc4f8d8f19f3074c2bb1f17b6502c92e5415098cd132a31769006d57e2846709bc1a3959deb29498dc0de074bd67450a3278e243fc4b8a4188dc3abee1516c56817892e91dcf98cf2327d7cab48350d1a795ba0815a8f35b791b3c73a580a58767e328a48e25c3676339e6c5c880167ad3ccb470fc5ad519a589056e876362e66f588f4fae88577557bcc9eb2d5c6eab3f2a7e39320c610553b3902922ed3b758d435905c0ced0f57ab994bc81ae28cca335f5c8b7753b6acaa45618767f7023549def81b395b325f15c044871756693a326697abf1fb294ca0f53fcb9641bd689300f761ff9287d4df91451ed6e72a3955744a45be106a951b9caf3f7a54b79036259727e6d795b5e9fe249d7636c67d68f431931de503749c8926d1fa138f28caf8a1b10e34bc8248f12f4979bfafdc0d90e2e4358a6128b048bb49fdf6a986efe0a3f6ea276f03d2b43602f9eb538a9ee9d9d198078785c41d891597082523b57898ed625d838417bb5febfa4ade3d523ec369b2ebbf3cf1244da5e23fc948912043400d830559a07a277a5581e00e7d0b65ada837deb4762063307b7a30767e9c0b5ac1157a4b8331ff0467be4d4656b1aaa815d86559f16628e312caa5f5a7a6f3408ca9b04360f735a0b40184d6e4e92b4ae5e713c2ddd93d83f33635379f7f2f08fdcb274173eec67404ea92f9dec69aadae3dcaa3d49fb27572e1d72a3afd48f6aabe99f8d2f4af796a5bcb84ec6962330afc021c172e825d0dc0712ac25478ec7b1bd6b8e01c4b3b6cb964acd7748e9733fe9620d0dc94d849d188d9d765837e41e4e8548c17b9f53906d41421cfaf7e2175a04b2215e3140a6586178377db78010dc943a4dbd3da412aee66734e46ac1893d3148bec3987326ae5a0e1e7dcaf93fb797f1af870231933e3f0d7b65f08f8b19c921c4c693d901beaf798ab9d42a6352a1131f2ccac668995aad11f1e66e9f6cd0bfe4b6b580ebf34cb78e1f98c054c4e98f75ec2b1e57978e2c0eeb5b8eede4308d3b6e0abd6e368795ed8e413d05c3d8e8e7b8c1249dee928de831250cf0e21627b7681f548bc43672f6e23a69abe94763c2068cd58feab0b899789c04a606a443d337c17706d911563e4849c8e3d5b18dd5bb599b376fba3915a0069e7a46776ae1fe8e27d2921f8adcfd68e2abbd276b216fa6bbf730add4e22aa418fac7904f13c573349f0960a3ab9f69656b72a894946b35a4ad0e3ee0cb40bf85e058266cccaadceeed152b95f15ff54e1d5151c05ba35b246e247f230c3cc113af4232ac7d6426e1ac3b9d3d17bac4a3067b56e47534e6228e3a689e1717d354a2dbaee2ebb0763b58bac4a236a0d80c36d7ae4c65d3766a2edfd870a3c4bac78c48840bd4403a5f0aec20a02042fc23cf337e483fb31362db7f1e585c4868d4aae11b3aff2ab088d7a5467c4eaddd4664959a4947a7ae8b495029a18d917397fff1786dc65037b98fdf353b17cd81569faa4ca3c73d33119f54375ff8e2f6a83a1ff39f21adea9cfe9ad9b22c163fd340ee6db657593eccd0f2300be477c85cbf55fa616658c6c4c979e45db9718550029a44bf8a0b6c28e157582749cec019259d341b7cba4c01bbbfba54384a0861434bd628218061987527d2a2eeead335278f5e6f99a937f84cfbc1e57b3420ef62248b04180cb7b74efd8dba281f9cebfd0b2d7842b6758c8affb2900bcea7e4313715eca0296498da4f1209969172514978105d1ffe569d0888dde6fe6ecdea7f243a3392d681dd8d49f9ac0620c2774d8855330ec38c15217af8a9122062cc274bf42a67b9f129122252687e350c6ca335458f000d289a8e9607b7c12661c85ce980fe49f16e9f510e0b4416635c6f3ad0378811d1eaa14826fa24ee3a2ffc7c0308eb47e2d2887b9118c1e3511320b56716151e66adba81076526fe2ee1744606b9cc67f32e46bf8a327dc645763b66a6de27f74b8272f1f2ad867f8387a3fee71b19d6d655737165e8cff43ee872b7bab6c816bfa8343a94a2bf9057cd7ef25efa8fcf30553f38fac0b4002f5d1bb6f2739ec99b3156c0afa129499175085e959fc1e3785b129ab9e07dd0cb54884c57a3e2977d0841adf5d513599bef8fb29b486c007b22c4c187abea23cf826d2cb1c0a797b9b82e191a770166dad3c8f2947cca67e4f61a4f8a090fb0f58505a7c63eefeaddf559d3e6d49919464143345181bb627667577a6716ab7c7bedee00e0e5654e8440798b81ae3b8712971b92a918673b3544c620667f466d571edaed874df816087baa3db21d676fc09777c64fa06dccccf1e71abab8f2c861b6d175be64802cafacbe25e4b55a4b47ac05e5a35aa5553a5d11c73952a679663bc1c3e2864cb7c173441e5b2814e63412396125611e11557c79367a90972758a48cc4fcb050d896051ea91d488a25957f5fa5fbb1fdaa25b422be18d6eae809baaa9592b11c7c2f8a06c2451e28c7e92c97d4228fc572f9158d798098b3fe3cc1170f10fad20538636fb0836d271e54aee491a7b5e8b45f71071b96c4af20f3b6c0c4201cbf80ed71810a021a14ce68e9b64ccdb2df094f66cf98f5f06b3a8ba78acb44be91b9b9137fd0585e051a4a666d124b14784bc061cdb3753db46c5989e4a3e7ec273ac74a6641190f9166d0133626e1a1a5b217319dcc901a8bac7c2d4abd1bceb06af557808d12627a192a3a13bb06bcbe719b4f0dbc3138dbcd97b6e6e61d2b7c874feba538b15e40d09962a7d4ccddde3f8a49eee5271d1b75f954c790773a7f74bf000d80aba18ec608dcfa938eb9284406dcb4a8eb8b1ecf9bd0d6068423a9492c98b6256baf466e7fbda991b0ac87f2c1a2fb7cbb151257b05be4429aea96851b3d50222c30291bcbbbc365f990ca126a679c6a81377d467b6065e705468f83f5b631a6ccb01e30960c155663e20037dbf00c3afa8ffad022f1261de0a04a5c119114c57e1949f71a1b5a2603b0bf0cdc7dd4f78c3281d4aca7831ee2f2ac3203fe7ae82a86948f30227c7910b2541c30d199e05a18c086ebe5cb0c55c18c83a7610574912923c1edbf61ac3ec72126d24cc1e793cdeee607184af4906bfb32b204ca8f6a6ccfee54b349900e8456a1cc160c0bb807cb97ff74502f12c4e3e6ab2487a0f29e7cdc1d712b1740e5073c66a61ab8399e69f07cda42a9080ed5c", 0xda1}], 0x6}, 0x0) 08:12:47 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f0b0000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:47 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x1d, &(0x7f0000000040), 0x8) 08:12:47 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x28, 0x0, 0x0) 08:12:47 executing program 1: r0 = socket(0x1c, 0x10000001, 0x84) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f0000000000), 0x7) [ 2284.614302][T29117] loop3: detected capacity change from 0 to 386 08:12:48 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r2 = fcntl$dupfd(r1, 0x0, r0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0x101, &(0x7f00000002c0), &(0x7f0000000140)=0x98) 08:12:48 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffff86f}, 0x14) [ 2284.822455][T29117] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2284.822455][T29117] 08:12:48 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f00000001c0), &(0x7f0000000040)=0x88) [ 2284.954530][T29117] ERROR: (device loop3): remounting filesystem as read-only [ 2285.000727][T29117] xtLookup: xtSearch returned -5 [ 2285.029230][T29117] read_mapping_page failed! [ 2285.048729][T29117] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2285.085074][T29117] Mount JFS Failure: -5 [ 2285.111194][T29117] jfs_mount failed w/return code = -5 [ 2285.209627][T29117] loop3: detected capacity change from 0 to 386 [ 2285.235975][T29117] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2285.235975][T29117] [ 2285.246552][T29117] ERROR: (device loop3): remounting filesystem as read-only [ 2285.255789][T29117] xtLookup: xtSearch returned -5 [ 2285.261877][T29117] read_mapping_page failed! [ 2285.266734][T29117] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2285.275449][T29117] Mount JFS Failure: -5 [ 2285.280896][T29117] jfs_mount failed w/return code = -5 08:12:49 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f00000000c0), &(0x7f0000000040)=0x90) 08:12:49 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x901, &(0x7f0000000200), &(0x7f0000000340)=0x8) 08:12:49 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$sock_int(r0, 0xffff, 0x4000, 0x0, 0x0) 08:12:49 executing program 2: syz_emit_ethernet(0x17ff, &(0x7f0000000080)={@empty, @empty, @val, {@ipv6}}, 0x0) 08:12:49 executing program 4: r0 = socket(0x2, 0x10000001, 0x84) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000000c0), 0x88) 08:12:49 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f0c0000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:49 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x3, &(0x7f0000000040)={0x0, 0x3, 0x0, 0x6}, 0x8) 08:12:49 executing program 1: clock_gettime(0x6, 0x0) 08:12:49 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x2e, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000f00), 0x0, 0x0) dup2(r1, r0) 08:12:49 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000080), 0x8) [ 2286.083471][T29160] loop3: detected capacity change from 0 to 386 08:12:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000000)=""/104, 0x68}], 0x1) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000080)=""/92, 0x5c}, {0x0}, {0x0}, {0x0}], 0x4) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x896e, 0x0, 0x0, 0x800e00519) shutdown(r2, 0x0) shutdown(r3, 0x0) 08:12:49 executing program 4: syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @empty, @val, {@ipv6}}, 0x0) [ 2286.243091][T29160] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2286.243091][T29160] [ 2286.308595][T29160] ERROR: (device loop3): remounting filesystem as read-only [ 2286.360068][T29160] xtLookup: xtSearch returned -5 [ 2286.396853][T29160] read_mapping_page failed! [ 2286.426834][T29160] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2286.486606][T29160] Mount JFS Failure: -5 [ 2286.508515][T29160] jfs_mount failed w/return code = -5 [ 2286.572462][T29160] loop3: detected capacity change from 0 to 386 [ 2286.594179][T29160] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2286.594179][T29160] [ 2286.619726][T29160] ERROR: (device loop3): remounting filesystem as read-only [ 2286.669231][T29160] xtLookup: xtSearch returned -5 [ 2286.697494][T29160] read_mapping_page failed! [ 2286.713562][T29160] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2286.739113][T29160] Mount JFS Failure: -5 [ 2286.746882][T29160] jfs_mount failed w/return code = -5 08:12:50 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0xa) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) accept$inet(r0, 0x0, 0x0) 08:12:50 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 08:12:50 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f00000000c0), &(0x7f0000000180)=0x90) 08:12:50 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind$inet6(r0, &(0x7f0000000180)={0x1c, 0x1c}, 0x1c) 08:12:50 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x107, &(0x7f0000000180), &(0x7f00000001c0)=0x18) 08:12:50 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f0d0000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:50 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000740)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1c"], 0xfc}, 0x0) 08:12:50 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) r1 = dup(r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000440)={0x0, @in, 0x0, 0x0, 0x284}, 0x98) 08:12:50 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) dup2(r1, r0) [ 2287.487376][T29194] loop3: detected capacity change from 0 to 386 08:12:50 executing program 1: mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0xc, 0x10, 0xffffffffffffff9c, 0x0) 08:12:51 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000002080)={&(0x7f0000000680)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) bind$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) [ 2287.715237][T29194] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2287.715237][T29194] [ 2287.771803][T29194] ERROR: (device loop3): remounting filesystem as read-only [ 2287.794017][T29194] xtLookup: xtSearch returned -5 [ 2287.816017][T29194] read_mapping_page failed! 08:12:51 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) r1 = dup(r0) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0x101, &(0x7f00000000c0), &(0x7f0000000000)=0xe4) [ 2287.828476][T29194] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2287.899721][T29194] Mount JFS Failure: -5 [ 2287.904171][T29194] jfs_mount failed w/return code = -5 [ 2288.224706][T29194] loop3: detected capacity change from 0 to 386 [ 2288.244360][T29194] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2288.244360][T29194] [ 2288.268902][T29194] ERROR: (device loop3): remounting filesystem as read-only [ 2288.293453][T29194] xtLookup: xtSearch returned -5 [ 2288.321547][T29194] read_mapping_page failed! [ 2288.326954][T29194] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2288.334641][T29194] Mount JFS Failure: -5 [ 2288.339286][T29194] jfs_mount failed w/return code = -5 08:12:51 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000080)='n', 0x1, 0x0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) 08:12:51 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x10, &(0x7f0000001800), &(0x7f0000001840)=0x4) 08:12:51 executing program 2: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x9, 0x0, 0x0) 08:12:51 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000180)=ANY=[], 0x9) dup2(r0, r1) 08:12:51 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvmsg(r0, &(0x7f0000001800)={0x0, 0x0, 0x0}, 0x2f1ba76951cf18fd) 08:12:51 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f0e0000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:51 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000140)=@in6={0x1c, 0x1c, 0x2}, 0x1c) connect$inet6(r0, &(0x7f00000001c0)={0x1c, 0x1c, 0x2}, 0x1c) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)='\x00', 0x1}], 0x1) 08:12:51 executing program 1: r0 = socket(0x2, 0x5, 0x0) r1 = dup(r0) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x42) 08:12:51 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="de", 0x1}], 0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="10"], 0x10}, 0x0) 08:12:52 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r1, r2) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x23, &(0x7f0000000100), 0x90) 08:12:52 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = socket(0x2, 0x5, 0x0) dup2(r0, r1) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000540)=ANY=[], 0x1008) [ 2288.782454][T29245] loop3: detected capacity change from 0 to 386 [ 2288.842151][T29245] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2288.842151][T29245] 08:12:52 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x7}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0xb) [ 2288.938814][T29245] ERROR: (device loop3): remounting filesystem as read-only [ 2289.002571][T29245] xtLookup: xtSearch returned -5 [ 2289.031714][T29245] read_mapping_page failed! [ 2289.036741][T29245] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2289.070465][T29245] Mount JFS Failure: -5 [ 2289.074995][T29245] jfs_mount failed w/return code = -5 [ 2289.167168][T29245] loop3: detected capacity change from 0 to 386 [ 2289.184195][T29245] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2289.184195][T29245] [ 2289.211108][T29245] ERROR: (device loop3): remounting filesystem as read-only [ 2289.249676][T29245] xtLookup: xtSearch returned -5 [ 2289.255652][T29245] read_mapping_page failed! [ 2289.265371][T29245] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2289.274023][T29245] Mount JFS Failure: -5 [ 2289.278635][T29245] jfs_mount failed w/return code = -5 08:12:52 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000001f80)={0x10, 0x2}, 0x10) listen(r0, 0xe1) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) r2 = accept4$inet(r0, 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000000100)="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", 0xaf4}], 0x1, &(0x7f0000001140)=[{0x10}], 0x10}, 0x104) 08:12:52 executing program 0: r0 = socket$inet6(0x1c, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x105, &(0x7f0000000140)={0x1c, 0x1c}, 0x1c) 08:12:52 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreq(r0, 0x0, 0x3b, 0x0, 0x0) 08:12:52 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) r1 = dup(r0) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x298e}, 0x14) 08:12:52 executing program 1: r0 = socket$inet(0x2, 0x5, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x10, 0x2}, 0x10) r1 = dup(r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f0000000200)=0x8) r3 = dup(r1) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x102, &(0x7f0000000000)={r2}, &(0x7f0000000040)=0x8) 08:12:52 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f0f0000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:52 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000080), 0x8) 08:12:52 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect(r0, &(0x7f0000000180)=@in6={0x1c, 0x1c, 0x2}, 0x1c) shutdown(r0, 0x1) 08:12:52 executing program 4: r0 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8, &(0x7f0000000100), 0x4) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)=@in={0x10, 0x2}, 0x10) shutdown(r0, 0x1) [ 2289.555239][T29277] loop3: detected capacity change from 0 to 386 08:12:53 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, &(0x7f00000001c0)="c5437c3accbcaf5f0e0ee713fae7da38a0478b131ec42931ac3aadd495472cc9b124b5b6c36d387294c2583bc35b3147f4a524046c473c376acbc6b9154c3440d8d0bf259dac3cf80509194560a614f134db085c998ac47ed1ccc9c96df7760ae831f51b9d9c938459f4813ac8409d1a4996839109e288ee4e150180ff3e1324a0826444242f3c5947a5a6acc6b75ae171ff785482195a2aa6c5745626dba29f011b81afc4c06fc3d3d191923737036df70803f934a57ab8943201461d2974160326badc002993ed7b", 0xc9, 0x0, &(0x7f0000000080)={0x10, 0x2}, 0x10) 08:12:53 executing program 2: mprotect(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x0) madvise(&(0x7f0000ff2000/0x2000)=nil, 0x3702, 0x0) [ 2289.651722][T29277] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2289.651722][T29277] 08:12:53 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f0000001540)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, &(0x7f0000001200)=[{&(0x7f0000000080)="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", 0xff1}, {0x0}], 0x2, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], 0x300}, 0x82) [ 2289.753329][T29277] ERROR: (device loop3): remounting filesystem as read-only [ 2289.786889][T29277] xtLookup: xtSearch returned -5 [ 2289.834720][T29277] read_mapping_page failed! [ 2289.863493][T29277] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2289.873705][T29277] Mount JFS Failure: -5 [ 2289.878138][T29277] jfs_mount failed w/return code = -5 [ 2289.936921][T29277] loop3: detected capacity change from 0 to 386 [ 2289.946921][T29277] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2289.946921][T29277] [ 2289.958802][T29277] ERROR: (device loop3): remounting filesystem as read-only [ 2290.053565][T29277] xtLookup: xtSearch returned -5 [ 2290.065422][T29277] read_mapping_page failed! [ 2290.077576][T29277] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2290.097194][T29277] Mount JFS Failure: -5 [ 2290.115109][T29277] jfs_mount failed w/return code = -5 08:12:53 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x10, 0x2}, 0x10) sendto$inet(r0, &(0x7f00000000c0)="1a", 0x1, 0x0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 08:12:53 executing program 4: r0 = socket(0x2, 0x5, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f0000000080), &(0x7f0000000140)=0x98) 08:12:53 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000005c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f00000004c0)=[{&(0x7f0000000040)='_', 0x1}], 0x1}, 0x0) 08:12:53 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001740)={&(0x7f0000000240)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f0000000140), &(0x7f0000000200)=0x98) 08:12:53 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000000), 0x98) 08:12:53 executing program 3: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f100000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {0x0}, {0x0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}], 0x0, &(0x7f0000000400)={[{@nointegrity}, {@gid}]}) 08:12:53 executing program 0: r0 = socket$inet6(0x1c, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x1c, 0x1c, 0x3}, 0x1c) 08:12:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000003740)=""/4082, 0xff2}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000240)=""/204, 0xcc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e00549) shutdown(r2, 0x0) recvmsg(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)=""/223, 0xdf}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) shutdown(r3, 0x0) 08:12:53 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x28, &(0x7f0000000080)=ANY=[@ANYBLOB="010092"], &(0x7f00000002c0)=0x8) 08:12:53 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0xe8) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000100)="e6", 0x1}], 0x1}, 0x0) [ 2290.481678][T29314] loop3: detected capacity change from 0 to 386 [ 2290.510610][T29314] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 2290.510610][T29314] [ 2290.523379][T29314] ERROR: (device loop3): remounting filesystem as read-only [ 2290.536055][T29314] xtLookup: xtSearch returned -5 [ 2290.542550][T29314] read_mapping_page failed! [ 2290.547409][T29314] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 2290.556581][T29314] BUG: unable to handle page fault for address: ffffffffffffff80 [ 2290.564623][T29314] #PF: supervisor read access in kernel mode [ 2290.570641][T29314] #PF: error_code(0x0000) - not-present page 08:12:53 executing program 1: r0 = socket(0x1c, 0x5, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000280), &(0x7f0000000180)=0x98) [ 2290.576658][T29314] PGD bc8f067 P4D bc8f067 PUD bc91067 PMD 0 [ 2290.582915][T29314] Oops: 0000 [#1] PREEMPT SMP KASAN [ 2290.588252][T29314] CPU: 1 PID: 29314 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 2290.596723][T29314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2290.606970][T29314] RIP: 0010:diFree+0x15b/0x2660 08:12:53 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) listen(r0, 0x4) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x12, &(0x7f00000002c0), 0x1) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) r2 = accept4$inet(r0, 0x0, 0x0, 0x0) sendmsg$inet_sctp(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="a5aaff2d995bbb539bf8f1c19ad738680ed545b1f31951b6f61f3dc69df6182d5f9fdc672864e1b7b59c58db2d763049907db78d86d8f732bb2f82e6968aed12e925de5a1fb6a73dff32701e362cc41c70e99b5762fc7e455e93100c6cb1704dd5334c0509748ed883241c7c8c0a5a3460565688c02cdb304d222d18e97861caae8ab45c8a7872042b46f58a246d25b13bcb1338b6d45e6e99", 0x99}], 0x1}, 0x0) [ 2290.613248][T29314] Code: 28 48 8d 78 80 48 89 44 24 18 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 a3 1f 00 00 48 8b 44 24 18 <48> 8b 68 80 4c 89 e8 48 c1 e8 0c 48 89 04 24 48 b8 00 00 00 00 00 [ 2290.635667][T29314] RSP: 0018:ffffc900028878d8 EFLAGS: 00010246 [ 2290.642981][T29314] RAX: 0000000000000000 RBX: ffff888019f50a00 RCX: ffffc900173c1000 [ 2290.652448][T29314] RDX: 1ffffffffffffff0 RSI: ffffffff82b5dd45 RDI: ffffffffffffff80 [ 2290.661515][T29314] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 2290.670221][T29314] R10: ffffffff82b386e5 R11: 0000000000000000 R12: ffff88808ae93748 [ 2290.679930][T29314] R13: 0000000000000001 R14: ffffffff89a422e0 R15: ffff88808ae93670 [ 2290.688208][T29314] FS: 00007f0d479b5700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 [ 2290.698588][T29314] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2290.705772][T29314] CR2: ffffffffffffff80 CR3: 000000001d85a000 CR4: 00000000001506e0 [ 2290.713965][T29314] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2290.723303][T29314] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2290.732027][T29314] Call Trace: [ 2290.736688][T29314] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2290.743359][T29314] ? truncate_inode_pages_range+0x4af/0x1080 [ 2290.750176][T29314] ? generic_error_remove_page+0xc0/0xc0 [ 2290.756085][T29314] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2290.763122][T29314] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2290.770729][T29314] ? diWrite+0x1550/0x1550 [ 2290.775960][T29314] ? __dquot_initialize+0x295/0xbe0 [ 2290.781256][T29314] ? find_held_lock+0x2d/0x110 [ 2290.786127][T29314] ? dquot_free_inode+0x6c0/0x6c0 [ 2290.791180][T29314] ? lock_downgrade+0x6e0/0x6e0 [ 2290.796063][T29314] ? var_wake_function+0x130/0x130 [ 2290.801203][T29314] ? rwlock_bug.part.0+0x90/0x90 [ 2290.806170][T29314] jfs_evict_inode+0x317/0x3d0 [ 2290.810967][T29314] ? jfs_write_inode+0x230/0x230 [ 2290.816008][T29314] evict+0x2ed/0x6b0 [ 2290.819937][T29314] iput.part.0+0x57e/0x810 [ 2290.824369][T29314] iput+0x58/0x70 [ 2290.828024][T29314] diFreeSpecial+0x73/0x100 [ 2290.832725][T29314] jfs_mount+0x1c1/0x7a0 [ 2290.836987][T29314] jfs_fill_super+0x5bd/0xc80 [ 2290.841686][T29314] ? init_once+0x130/0x130 [ 2290.846128][T29314] ? set_blocksize+0x1c1/0x400 [ 2290.851009][T29314] mount_bdev+0x34d/0x410 [ 2290.855365][T29314] ? init_once+0x130/0x130 [ 2290.859807][T29314] ? jfs_get_dquots+0x10/0x10 [ 2290.864503][T29314] legacy_get_tree+0x105/0x220 [ 2290.869309][T29314] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2290.875576][T29314] vfs_get_tree+0x89/0x2f0 [ 2290.880041][T29314] path_mount+0x132a/0x1f90 [ 2290.884578][T29314] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2290.890846][T29314] ? strncpy_from_user+0x2a0/0x3e0 [ 2290.895994][T29314] ? finish_automount+0xad0/0xad0 [ 2290.901066][T29314] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2290.907333][T29314] ? getname_flags.part.0+0x1dd/0x4f0 [ 2290.912907][T29314] __x64_sys_mount+0x27f/0x300 [ 2290.917701][T29314] ? copy_mnt_ns+0xae0/0xae0 [ 2290.922325][T29314] ? syscall_enter_from_user_mode+0x27/0x70 [ 2290.928388][T29314] do_syscall_64+0x3a/0xb0 [ 2290.932845][T29314] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2290.938774][T29314] RIP: 0033:0x467b1a [ 2290.942696][T29314] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2290.962330][T29314] RSP: 002b:00007f0d479b4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2290.970790][T29314] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 2290.978786][T29314] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007f0d479b5000 [ 2290.986881][T29314] RBP: 00007f0d479b5040 R08: 00007f0d479b5040 R09: 0000000020000040 [ 2290.994877][T29314] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000040 [ 2291.002868][T29314] R13: 0000000020000100 R14: 00007f0d479b5000 R15: 0000000020000400 [ 2291.010867][T29314] Modules linked in: [ 2291.014781][T29314] CR2: ffffffffffffff80 [ 2291.018967][T29314] ---[ end trace ae7e2ea43e64ceff ]--- [ 2291.024520][T29314] RIP: 0010:diFree+0x15b/0x2660 [ 2291.029407][T29314] Code: 28 48 8d 78 80 48 89 44 24 18 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 a3 1f 00 00 48 8b 44 24 18 <48> 8b 68 80 4c 89 e8 48 c1 e8 0c 48 89 04 24 48 b8 00 00 00 00 00 [ 2291.049046][T29314] RSP: 0018:ffffc900028878d8 EFLAGS: 00010246 [ 2291.055148][T29314] RAX: 0000000000000000 RBX: ffff888019f50a00 RCX: ffffc900173c1000 [ 2291.063144][T29314] RDX: 1ffffffffffffff0 RSI: ffffffff82b5dd45 RDI: ffffffffffffff80 [ 2291.071221][T29314] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 2291.079206][T29314] R10: ffffffff82b386e5 R11: 0000000000000000 R12: ffff88808ae93748 [ 2291.087195][T29314] R13: 0000000000000001 R14: ffffffff89a422e0 R15: ffff88808ae93670 [ 2291.095188][T29314] FS: 00007f0d479b5700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 [ 2291.104148][T29314] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2291.110757][T29314] CR2: ffffffffffffff80 CR3: 000000001d85a000 CR4: 00000000001506e0 [ 2291.118748][T29314] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2291.126733][T29314] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2291.134730][T29314] Kernel panic - not syncing: Fatal exception [ 2291.141314][T29314] Kernel Offset: disabled [ 2291.145642][T29314] Rebooting in 86400 seconds..